Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571384?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571384?format=api", "purl": "pkg:deb/debian/freetype@1.3.1-1", "type": "deb", "namespace": "debian", "name": "freetype", "version": "1.3.1-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "latest_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38514?format=api", "vulnerability_id": "VCID-17au-pc1k-m7at", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90103", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90163", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084", "reference_id": "1191084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9662" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=api", "vulnerability_id": "VCID-1teu-tz69-dff8", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85892", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85879", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584", "reference_id": "800584", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128", "reference_id": "CVE-2012-1128", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1128" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=api", "vulnerability_id": "VCID-1ws8-ww77-ybah", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.8986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89864", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89871", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190", "reference_id": "1191190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9674" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=api", "vulnerability_id": "VCID-2fsn-uxp3-fbeg", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587", "reference_id": "800587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130", "reference_id": "CVE-2012-1130", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1130" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34274?format=api", "vulnerability_id": "VCID-2kj7-a6r9-bfft", "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n and Workstation, allowing remote and local attackers to conduct several\n attacks, including privilege escalation, remote execution of arbitrary\n code, and a Denial of Service.", "references": [ { "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.8815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88088", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88109", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88128", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88134", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88143", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88136", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03824", "scoring_system": "epss", "scoring_elements": "0.88137", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806" }, { "reference_url": "http://secunia.com/advisories/30600", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30600" }, { "reference_url": "http://secunia.com/advisories/30721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30721" }, { "reference_url": "http://secunia.com/advisories/30740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30740" }, { "reference_url": "http://secunia.com/advisories/30766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30766" }, { "reference_url": "http://secunia.com/advisories/30819", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30819" }, { "reference_url": "http://secunia.com/advisories/30821", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30821" }, { "reference_url": "http://secunia.com/advisories/30967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30967" }, { "reference_url": "http://secunia.com/advisories/31479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31479" }, { "reference_url": "http://secunia.com/advisories/31577", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31577" }, { "reference_url": "http://secunia.com/advisories/31707", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31707" }, { "reference_url": "http://secunia.com/advisories/31709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31709" }, { "reference_url": "http://secunia.com/advisories/31711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31711" }, { "reference_url": "http://secunia.com/advisories/31712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31712" }, { "reference_url": "http://secunia.com/advisories/31823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31823" }, { "reference_url": "http://secunia.com/advisories/31856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31856" }, { "reference_url": "http://secunia.com/advisories/31900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31900" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "reference_url": "http://securitytracker.com/id?1020238", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020238" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2608" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1" }, { "reference_url": "http://support.apple.com/kb/HT3026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3026" }, { "reference_url": "http://support.apple.com/kb/HT3129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3129" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/29640", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29640" }, { "reference_url": "http://www.ubuntu.com/usn/usn-643-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-643-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1794" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1876/references" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2423" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2466", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768", "reference_id": "450768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841", "reference_id": "485841", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806", "reference_id": "CVE-2008-1806", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806" }, { "reference_url": "https://security.gentoo.org/glsa/200806-10", "reference_id": "GLSA-200806-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200806-10" }, { "reference_url": "https://security.gentoo.org/glsa/201209-25", "reference_id": "GLSA-201209-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556", "reference_id": "RHSA-2008:0556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558", "reference_id": "RHSA-2008:0558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0558" }, { "reference_url": "https://usn.ubuntu.com/643-1/", "reference_id": "USN-643-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/643-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2008-1806" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=api", "vulnerability_id": "VCID-38u1-6t8n-gqey", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84196", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84233", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606", "reference_id": "800606", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143", "reference_id": "CVE-2012-1143", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1143" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=api", "vulnerability_id": "VCID-3jn7-t1f6-uyfr", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079", "reference_id": "1191079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9657" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35801?format=api", "vulnerability_id": "VCID-3vb1-m8xt-kfcf", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88843", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88898", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" }, { "reference_url": "http://secunia.com/advisories/42289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42289" }, { "reference_url": "http://secunia.com/advisories/42295", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42295" }, { "reference_url": "http://secunia.com/advisories/43138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43138" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?31310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?31310" }, { "reference_url": "http://support.apple.com/kb/HT4564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4564" }, { "reference_url": "http://support.apple.com/kb/HT4565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4565" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "http://support.apple.com/kb/HT4802", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4802" }, { "reference_url": "http://support.apple.com/kb/HT4803", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4803" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100122733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100122733" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2155", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2155" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html" }, { "reference_url": "http://www.securityfocus.com/bid/44214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44214" }, { "reference_url": "http://www.securitytracker.com/id?1024745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024745" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3037" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "602221", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275", "reference_id": "645275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855", "reference_id": "CVE-2010-3855", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0889", "reference_id": "RHSA-2010:0889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0889" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-3855" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31560?format=api", "vulnerability_id": "VCID-3wjn-8gnc-gkhr", "summary": "Multiple vulnerabilities in FreeType might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc" }, { "reference_url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178" }, { "reference_url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "reference_url": "http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html" }, { "reference_url": "http://osvdb.org/36509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36509" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2754", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97436", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97408", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97422", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97427", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.41922", "scoring_system": "epss", "scoring_elements": "0.97428", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2754" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754" }, { "reference_url": "http://secunia.com/advisories/25350", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25350" }, { "reference_url": "http://secunia.com/advisories/25353", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25353" }, { "reference_url": "http://secunia.com/advisories/25386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25386" }, { "reference_url": "http://secunia.com/advisories/25463", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25463" }, { "reference_url": "http://secunia.com/advisories/25483", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25483" }, { "reference_url": "http://secunia.com/advisories/25609", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25609" }, { "reference_url": "http://secunia.com/advisories/25612", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25612" }, { "reference_url": "http://secunia.com/advisories/25654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25654" }, { "reference_url": "http://secunia.com/advisories/25705", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25705" }, { "reference_url": "http://secunia.com/advisories/25808", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25808" }, { "reference_url": "http://secunia.com/advisories/25894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25894" }, { "reference_url": "http://secunia.com/advisories/25905", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25905" }, { "reference_url": "http://secunia.com/advisories/26129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26129" }, { "reference_url": "http://secunia.com/advisories/26305", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26305" }, { "reference_url": "http://secunia.com/advisories/28298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/28298" }, { "reference_url": "http://secunia.com/advisories/30161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30161" }, { "reference_url": "http://secunia.com/advisories/35074", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35074" }, { "reference_url": "http://secunia.com/advisories/35200", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35200" }, { "reference_url": "http://secunia.com/advisories/35204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35204" }, { "reference_url": "http://secunia.com/advisories/35233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35233" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1390" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1" }, { "reference_url": "http://support.apple.com/kb/HT3549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3549" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1302", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1302" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1334" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:121" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_41_freetype2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_41_freetype2.html" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0403.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0403.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/469463/100/200/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/469463/100/200/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/471286/30/6180/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/471286/30/6180/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/24074", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24074" }, { "reference_url": "http://www.securitytracker.com/id?1018088", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1018088" }, { "reference_url": "http://www.trustix.org/errata/2007/0019/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0019/" }, { "reference_url": "http://www.ubuntu.com/usn/usn-466-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-466-1" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1894" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2229", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2229" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/0049", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/0049" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1297", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200", "reference_id": "240200", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625", "reference_id": "425625", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754", "reference_id": "CVE-2007-2754", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754" }, { "reference_url": "https://security.gentoo.org/glsa/200705-22", "reference_id": "GLSA-200705-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-22" }, { "reference_url": "https://security.gentoo.org/glsa/200707-02", "reference_id": "GLSA-200707-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200707-02" }, { "reference_url": "https://security.gentoo.org/glsa/201006-01", "reference_id": "GLSA-201006-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0403", "reference_id": "RHSA-2007:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329", "reference_id": "RHSA-2009:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062", "reference_id": "RHSA-2009:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "reference_url": "https://usn.ubuntu.com/466-1/", "reference_id": "USN-466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/466-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2007-2754" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjn-8gnc-gkhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=api", "vulnerability_id": "VCID-3xz8-4wu5-fugq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30263" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167", "reference_id": "613167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500", "reference_id": "CVE-2010-2500", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2500" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37481?format=api", "vulnerability_id": "VCID-468g-dxsr-8yer", "summary": "A vulnerability in FreeType could result in execution of arbitrary\n code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.8304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83116", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646", "reference_id": "1074646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299", "reference_id": "741299", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299" }, { "reference_url": "https://security.gentoo.org/glsa/201408-02", "reference_id": "GLSA-201408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-02" }, { "reference_url": "https://usn.ubuntu.com/2148-1/", "reference_id": "USN-2148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2148-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-2240" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35794?format=api", "vulnerability_id": "VCID-48rk-qwp7-j7a8", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89903", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.8993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89923", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30657" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627", "reference_id": "625627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807", "reference_id": "CVE-2010-2807", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2807" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=api", "vulnerability_id": "VCID-4wp3-qsuc-1kh9", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92792", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92754", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.9276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92765", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.9278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92781", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30656" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980", "reference_id": "621980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806", "reference_id": "CVE-2010-2806", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2806" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=api", "vulnerability_id": "VCID-57th-r73p-a3fy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127912955808467&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127912955808467&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.8481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84817", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84827", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527" }, { "reference_url": "http://savannah.nongnu.org/bugs/?30054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://savannah.nongnu.org/bugs/?30054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557", "reference_id": "614557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527", "reference_id": "CVE-2010-2527", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2527" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=api", "vulnerability_id": "VCID-5rpx-8t3t-syhv", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598", "reference_id": "800598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139", "reference_id": "CVE-2012-1139", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1139" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90673?format=api", "vulnerability_id": "VCID-5z69-3ht1-kfeh", "summary": "CVE-2007-3506 Emboldden rendering with a sbit font makes glibc detected.", "references": [ { "reference_url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72998", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72901", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.7293", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72956", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72982", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00742", "scoring_system": "epss", "scoring_elements": "0.72957", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3506" }, { "reference_url": "http://savannah.nongnu.org/bugs/index.php?19536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://savannah.nongnu.org/bugs/index.php?19536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506" }, { "reference_url": "http://secunia.com/advisories/25884", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25884" }, { "reference_url": "https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970" }, { "reference_url": "http://www.securityfocus.com/bid/24708", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24708" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=235479", "reference_id": "235479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235479" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013", "reference_id": "432013", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3506", "reference_id": "CVE-2007-3506", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3506" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2007-3506" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z69-3ht1-kfeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=api", "vulnerability_id": "VCID-613j-8z2t-t3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585", "reference_id": "800585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129", "reference_id": "CVE-2012-1129", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1129" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35800?format=api", "vulnerability_id": "VCID-64dt-nnzb-mkfc", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90357", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/43138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43138" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://security-tracker.debian.org/tracker/CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security-tracker.debian.org/tracker/CVE-2010-3814" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2155", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2155" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236" }, { "reference_url": "http://www.securityfocus.com/bid/44643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44643" }, { "reference_url": "http://www.securitytracker.com/id?1024767", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024767" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "602221", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814", "reference_id": "CVE-2010-3814", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-3814" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=api", "vulnerability_id": "VCID-6pzj-1sgf-zbbr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607", "reference_id": "800607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144", "reference_id": "CVE-2012-1144", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1144" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=api", "vulnerability_id": "VCID-6xf8-49hw-hfaf", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66561", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66572", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965", "reference_id": "1429965", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971", "reference_id": "856971", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3237-1/", "reference_id": "USN-3237-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3237-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2016-10244" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=api", "vulnerability_id": "VCID-6z8y-k8vw-nudd", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604", "reference_id": "800604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142", "reference_id": "CVE-2012-1142", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1142" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=api", "vulnerability_id": "VCID-73d5-ezt5-87eh", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.8563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85653", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085", "reference_id": "1191085", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9663" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=api", "vulnerability_id": "VCID-73e1-scax-8ugj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84141", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192", "reference_id": "1191192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9675" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35799?format=api", "vulnerability_id": "VCID-7698-fwj1-fufd", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.8788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.8782", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87835", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04785", "scoring_system": "epss", "scoring_elements": "0.89433", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2116" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/43700", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43700" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625", "reference_id": "623625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311", "reference_id": "CVE-2010-3311", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-3311" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35802?format=api", "vulnerability_id": "VCID-79js-ywyp-x3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93274", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93322", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871", "reference_id": "635871", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701", "reference_id": "722701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1085", "reference_id": "RHSA-2011:1085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1085" }, { "reference_url": "https://usn.ubuntu.com/1173-1/", "reference_id": "USN-1173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1173-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-0226" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88870?format=api", "vulnerability_id": "VCID-7jyc-psvy-hkgh", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93955", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.9397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12644", "scoring_system": "epss", "scoring_elements": "0.93988", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618110", "reference_id": "1618110", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618110" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt", "reference_id": "CVE-2006-2661;OSVDB-26033", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt" }, { "reference_url": "https://www.securityfocus.com/bid/18329/info", "reference_id": "CVE-2006-2661;OSVDB-26033", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/18329/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500", "reference_id": "RHSA-2006:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0500" }, { "reference_url": "https://usn.ubuntu.com/291-1/", "reference_id": "USN-291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/291-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571387?format=api", "purl": "pkg:deb/debian/freetype@2.2.1-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-2kj7-a6r9-bfft" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3wjn-8gnc-gkhr" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-5z69-3ht1-kfeh" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qn37-kjm4-tbap" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-rcck-xn4c-k3at" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-txkg-jsdf-93e6" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5" } ], "aliases": [ "CVE-2006-2661" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyc-psvy-hkgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=api", "vulnerability_id": "VCID-a9r6-k8gp-nbfs", "summary": "freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.8598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85966", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85944", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85954", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?46346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?46346" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613", "reference_id": "1763613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383", "reference_id": "CVE-2015-9383", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383" }, { "reference_url": "https://usn.ubuntu.com/4126-1/", "reference_id": "USN-4126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-1/" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9383" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=api", "vulnerability_id": "VCID-ahxa-yjxp-a7en", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8733", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30248" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30249", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30249" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162", "reference_id": "613162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499", "reference_id": "CVE-2010-2499", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2499" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=api", "vulnerability_id": "VCID-ask2-xeb7-7qbk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.86989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.8704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87058", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094", "reference_id": "1191094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9671" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=api", "vulnerability_id": "VCID-b35u-t7u2-sudy", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.7472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74757", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746", "reference_id": "CVE-2014-9746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35782?format=api", "vulnerability_id": "VCID-bt31-xk8r-8qd2", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84022", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30082" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30083" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154", "reference_id": "613154", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497", "reference_id": "CVE-2010-2497", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2497" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31559?format=api", "vulnerability_id": "VCID-cvba-wjra-wye9", "summary": "Multiple vulnerabilities in FreeType might result in the remote execution\n of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92343", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.9235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92356", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.9236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92371", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92382", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92384", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08522", "scoring_system": "epss", "scoring_elements": "0.92394", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437", "reference_id": "484437", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437" }, { "reference_url": "https://security.gentoo.org/glsa/200607-02", "reference_id": "GLSA-200607-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200607-02" }, { "reference_url": "https://security.gentoo.org/glsa/200710-09", "reference_id": "GLSA-200710-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200710-09" }, { "reference_url": "https://security.gentoo.org/glsa/201006-01", "reference_id": "GLSA-201006-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201006-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500", "reference_id": "RHSA-2006:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329", "reference_id": "RHSA-2009:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062", "reference_id": "RHSA-2009:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "reference_url": "https://usn.ubuntu.com/291-1/", "reference_id": "USN-291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/291-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571387?format=api", "purl": "pkg:deb/debian/freetype@2.2.1-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-2kj7-a6r9-bfft" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3wjn-8gnc-gkhr" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-5z69-3ht1-kfeh" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qn37-kjm4-tbap" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-rcck-xn4c-k3at" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-txkg-jsdf-93e6" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5" } ], "aliases": [ "CVE-2006-1861" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvba-wjra-wye9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=api", "vulnerability_id": "VCID-cwfg-1d6f-hfgg", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128110167119337&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128110167119337&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.9198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91976", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30658" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907", "reference_id": "621907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808", "reference_id": "CVE-2010-2808", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2808" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=api", "vulnerability_id": "VCID-d2v4-gm58-uyby", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600", "reference_id": "800600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140", "reference_id": "CVE-2012-1140", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1140" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=api", "vulnerability_id": "VCID-dcxj-zzfj-3bg7", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985", "reference_id": "2077985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5453-1/", "reference_id": "USN-5453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5453-1/" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27406" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=api", "vulnerability_id": "VCID-edag-8pt8-jqdw", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595", "reference_id": "800595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137", "reference_id": "CVE-2012-1137", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1137" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=api", "vulnerability_id": "VCID-ettc-tamy-kfcf", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591", "reference_id": "800591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133", "reference_id": "CVE-2012-1133", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=api", "vulnerability_id": "VCID-ewj8-a9c8-w3dy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593", "reference_id": "800593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135", "reference_id": "CVE-2012-1135", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1135" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46225?format=api", "vulnerability_id": "VCID-f9ym-em5n-87ep", "summary": "Multiple integer overflows in FreeType might allow for the remote execution\n of arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94827", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.9484", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.9486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94872", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384", "reference_id": "491384", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925", "reference_id": "524925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925" }, { "reference_url": "https://security.gentoo.org/glsa/200905-05", "reference_id": "GLSA-200905-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-05" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329", "reference_id": "RHSA-2009:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1061", "reference_id": "RHSA-2009:1061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062", "reference_id": "RHSA-2009:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "reference_url": "https://usn.ubuntu.com/767-1/", "reference_id": "USN-767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2009-0946" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=api", "vulnerability_id": "VCID-fp2p-5ymf-wffj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85204", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092", "reference_id": "1191092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9669" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=api", "vulnerability_id": "VCID-gcht-dzky-fbay", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88206", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88263", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.securityfocus.com/bid/42621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42621" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632", "reference_id": "625632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054", "reference_id": "CVE-2010-3054", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-3054" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35803?format=api", "vulnerability_id": "VCID-gcr7-xxtw-e3bs", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.8533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85331", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87114", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120", "reference_id": "646120", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226", "reference_id": "746226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1402", "reference_id": "RHSA-2011:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-3256" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=api", "vulnerability_id": "VCID-gmk4-9sks-s3a5", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89282", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342", "reference_id": "617342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541", "reference_id": "CVE-2010-2541", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2541" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38523?format=api", "vulnerability_id": "VCID-gtka-sbgw-tuf5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88852", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.8886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88921", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087", "reference_id": "1191087", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9665" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=api", "vulnerability_id": "VCID-h7qy-dusf-tqb7", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602", "reference_id": "800602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141", "reference_id": "CVE-2012-1141", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1141" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=api", "vulnerability_id": "VCID-hgkz-p83z-ybfe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583", "reference_id": "800583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127", "reference_id": "CVE-2012-1127", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1127" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=api", "vulnerability_id": "VCID-hutw-rk7x-5bc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86373", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377", "reference_id": "1262377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620", "reference_id": "798620", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620" }, { "reference_url": "https://usn.ubuntu.com/2739-1/", "reference_id": "USN-2739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9745" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=api", "vulnerability_id": "VCID-jg4p-nv1j-fyb9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.8977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093", "reference_id": "1191093", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9670" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38501?format=api", "vulnerability_id": "VCID-jn9w-2axj-8ke5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86208", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.8626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86275", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081", "reference_id": "1191081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084", "reference_id": "773084", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9659" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=api", "vulnerability_id": "VCID-jwbe-5wmu-uqgp", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589", "reference_id": "800589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131", "reference_id": "CVE-2012-1131", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1131" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88869?format=api", "vulnerability_id": "VCID-kdfa-8q7m-2kbk", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97615", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97628", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.45933", "scoring_system": "epss", "scoring_elements": "0.97636", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618019", "reference_id": "1618019", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618019" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt", "reference_id": "CVE-2006-0747;OSVDB-26032", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt" }, { "reference_url": "https://www.securityfocus.com/bid/18326/info", "reference_id": "CVE-2006-0747;OSVDB-26032", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/18326/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500", "reference_id": "RHSA-2006:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0500" }, { "reference_url": "https://usn.ubuntu.com/291-1/", "reference_id": "USN-291-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/291-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571387?format=api", "purl": "pkg:deb/debian/freetype@2.2.1-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-2kj7-a6r9-bfft" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3wjn-8gnc-gkhr" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-5z69-3ht1-kfeh" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qn37-kjm4-tbap" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-rcck-xn4c-k3at" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-txkg-jsdf-93e6" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5" } ], "aliases": [ "CVE-2006-0747" ], "risk_score": 0.8, "exploitability": "2.0", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdfa-8q7m-2kbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=api", "vulnerability_id": "VCID-m8ha-zxb7-tyg6", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.8176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81762", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99093" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500", "reference_id": "1446500", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220", "reference_id": "861220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105", "reference_id": "CVE-2017-8105", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8105" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=api", "vulnerability_id": "VCID-mv93-73qb-ekgt", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590", "reference_id": "800590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132", "reference_id": "CVE-2012-1132", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=api", "vulnerability_id": "VCID-n99m-fgj7-y3bk", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597", "reference_id": "800597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138", "reference_id": "CVE-2012-1138", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1138" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=api", "vulnerability_id": "VCID-nakp-vmxa-akey", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78478", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78504", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78537", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086", "reference_id": "1191086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9664" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38533?format=api", "vulnerability_id": "VCID-nfp7-sjcv-wkfv", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82336", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.8235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82391", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82409", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82444", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091", "reference_id": "1191091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9668" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=api", "vulnerability_id": "VCID-nn4w-gq71-kfgd", "summary": "freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65997", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802", "reference_id": "1741802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9290" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=api", "vulnerability_id": "VCID-nx21-ks3v-53e4", "summary": "Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99773", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999" }, { "reference_url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html" }, { "reference_url": "https://crbug.com/1139963", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://crbug.com/1139963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" }, { "reference_url": "http://seclists.org/fulldisclosure/2020/Nov/33", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://seclists.org/fulldisclosure/2020/Nov/33" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/cefsharp/CefSharp", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp" }, { "reference_url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999" }, { "reference_url": "https://security.gentoo.org/glsa/202011-12", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202011-12" }, { "reference_url": "https://security.gentoo.org/glsa/202012-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202012-04" }, { "reference_url": "https://security.gentoo.org/glsa/202401-19", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202401-19" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240812-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240812-0001" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4824", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Common", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Common" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.WinForms", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.WinForms" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210", "reference_id": "1890210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586", "reference_id": "972586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586" }, { "reference_url": "https://security.archlinux.org/ASA-202010-10", "reference_id": "ASA-202010-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-10" }, { "reference_url": "https://security.archlinux.org/ASA-202010-11", "reference_id": "ASA-202010-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-11" }, { "reference_url": "https://security.archlinux.org/ASA-202011-12", "reference_id": "ASA-202011-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-12" }, { "reference_url": "https://security.archlinux.org/AVG-1254", "reference_id": "AVG-1254", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1254" }, { "reference_url": "https://security.archlinux.org/AVG-1255", "reference_id": "AVG-1255", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1255" }, { "reference_url": "https://security.archlinux.org/AVG-1279", "reference_id": "AVG-1279", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1279" }, { "reference_url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "GHSA-pv36-h7jh-qm62", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://security.gentoo.org/glsa/202010-07", "reference_id": "GLSA-202010-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/", "reference_id": "J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50", "reference_id": "mfsa2020-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51", "reference_id": "mfsa2020-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52", "reference_id": "mfsa2020-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4351", "reference_id": "RHSA-2020:4351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4907", "reference_id": "RHSA-2020:4907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4949", "reference_id": "RHSA-2020:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4950", "reference_id": "RHSA-2020:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4951", "reference_id": "RHSA-2020:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4952", "reference_id": "RHSA-2020:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4952" }, { "reference_url": "https://usn.ubuntu.com/4593-1/", "reference_id": "USN-4593-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-1/" }, { "reference_url": "https://usn.ubuntu.com/4593-2/", "reference_id": "USN-4593-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2020-15999", "GHSA-pv36-h7jh-qm62" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=api", "vulnerability_id": "VCID-p2yw-ksc4-jfe9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082", "reference_id": "1191082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9660" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=api", "vulnerability_id": "VCID-p8h9-9xku-hbhv", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80537", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80622", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089", "reference_id": "1191089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9666" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=api", "vulnerability_id": "VCID-pznp-81q7-z3d4", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080", "reference_id": "1191080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9658" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=api", "vulnerability_id": "VCID-pzsb-3h3d-t7hq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30106" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160", "reference_id": "613160", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498", "reference_id": "CVE-2010-2498", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2498" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44715?format=api", "vulnerability_id": "VCID-qn37-kjm4-tbap", "summary": "A vulnerability has been discovered in FreeType allowing for user-assisted\n remote execution of arbitrary code.", "references": [ { "reference_url": "http://issues.foresightlinux.org/browse/FL-223", "reference_id": "", "reference_type": "", "scores": [], "url": "http://issues.foresightlinux.org/browse/FL-223" }, { "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", "reference_id": "", "reference_type": "", "scores": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501" }, { "reference_url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1351", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91975", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91916", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91924", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91938", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91951", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07768", "scoring_system": "epss", "scoring_elements": "0.91959", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1351" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351" }, { "reference_url": "http://secunia.com/advisories/24741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24741" }, { "reference_url": "http://secunia.com/advisories/24745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24745" }, { "reference_url": "http://secunia.com/advisories/24756", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24756" }, { "reference_url": "http://secunia.com/advisories/24758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24758" }, { "reference_url": "http://secunia.com/advisories/24765", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24765" }, { "reference_url": "http://secunia.com/advisories/24768", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24768" }, { "reference_url": "http://secunia.com/advisories/24770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24770" }, { "reference_url": "http://secunia.com/advisories/24771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24771" }, { "reference_url": "http://secunia.com/advisories/24772", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24772" }, { "reference_url": "http://secunia.com/advisories/24776", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24776" }, { "reference_url": "http://secunia.com/advisories/24791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24791" }, { "reference_url": "http://secunia.com/advisories/24885", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24885" }, { "reference_url": "http://secunia.com/advisories/24889", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24889" }, { "reference_url": "http://secunia.com/advisories/24921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24921" }, { "reference_url": "http://secunia.com/advisories/24996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24996" }, { "reference_url": "http://secunia.com/advisories/25004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25004" }, { "reference_url": "http://secunia.com/advisories/25006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25006" }, { "reference_url": "http://secunia.com/advisories/25096", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25096" }, { "reference_url": "http://secunia.com/advisories/25195", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25195" }, { "reference_url": "http://secunia.com/advisories/25216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25216" }, { "reference_url": "http://secunia.com/advisories/25305", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25305" }, { "reference_url": "http://secunia.com/advisories/25495", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25495" }, { "reference_url": "http://secunia.com/advisories/28333", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/28333" }, { "reference_url": "http://secunia.com/advisories/30161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30161" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-02.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-10.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1213" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=498954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=498954" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1294" }, { "reference_url": "http://www.debian.org/security/2008/dsa-1454", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2008/dsa-1454" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_27_x.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_27_x.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "reference_url": "http://www.openbsd.org/errata39.html#021_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata39.html#021_xorg" }, { "reference_url": "http://www.openbsd.org/errata40.html#011_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata40.html#011_xorg" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0132.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0132.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0150.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0150.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/23283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23283" }, { "reference_url": "http://www.securityfocus.com/bid/23300", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23300" }, { "reference_url": "http://www.securityfocus.com/bid/23402", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23402" }, { "reference_url": "http://www.securitytracker.com/id?1017857", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1017857" }, { "reference_url": "http://www.trustix.org/errata/2007/0013/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2007/0013/" }, { "reference_url": "http://www.ubuntu.com/usn/usn-448-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-448-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1217" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1264", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1264" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1548", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1548" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=235265", "reference_id": "235265", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235265" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771", "reference_id": "426771", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1351", "reference_id": "CVE-2007-1351", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1351" }, { "reference_url": "https://security.gentoo.org/glsa/200705-02", "reference_id": "GLSA-200705-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-02" }, { "reference_url": "https://security.gentoo.org/glsa/200705-10", "reference_id": "GLSA-200705-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0125", "reference_id": "RHSA-2007:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0126", "reference_id": "RHSA-2007:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0132", "reference_id": "RHSA-2007:0132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0132" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0150", "reference_id": "RHSA-2007:0150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0150" }, { "reference_url": "https://usn.ubuntu.com/448-1/", "reference_id": "USN-448-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/448-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2007-1351" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qn37-kjm4-tbap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36612?format=api", "vulnerability_id": "VCID-qu13-pxwm-d3da", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86501", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86526", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86517", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37907" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094", "reference_id": "890094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670", "reference_id": "CVE-2012-5670", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5670" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34278?format=api", "vulnerability_id": "VCID-rcck-xn4c-k3at", "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n and Workstation, allowing remote and local attackers to conduct several\n attacks, including privilege escalation, remote execution of arbitrary\n code, and a Denial of Service.", "references": [ { "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.8566", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85565", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85577", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85594", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.8562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85644", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0261", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808" }, { "reference_url": "http://secunia.com/advisories/30600", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30600" }, { "reference_url": "http://secunia.com/advisories/30721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30721" }, { "reference_url": "http://secunia.com/advisories/30740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30740" }, { "reference_url": "http://secunia.com/advisories/30766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30766" }, { "reference_url": "http://secunia.com/advisories/30819", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30819" }, { "reference_url": "http://secunia.com/advisories/30821", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30821" }, { "reference_url": "http://secunia.com/advisories/30967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30967" }, { "reference_url": "http://secunia.com/advisories/31479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31479" }, { "reference_url": "http://secunia.com/advisories/31577", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31577" }, { "reference_url": "http://secunia.com/advisories/31707", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31707" }, { "reference_url": "http://secunia.com/advisories/31709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31709" }, { "reference_url": "http://secunia.com/advisories/31711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31711" }, { "reference_url": "http://secunia.com/advisories/31712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31712" }, { "reference_url": "http://secunia.com/advisories/31823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31823" }, { "reference_url": "http://secunia.com/advisories/31856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31856" }, { "reference_url": "http://secunia.com/advisories/31900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31900" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://secunia.com/advisories/35204", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35204" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "reference_url": "http://securitytracker.com/id?1020240", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020240" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2608" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1" }, { "reference_url": "http://support.apple.com/kb/HT3026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3026" }, { "reference_url": "http://support.apple.com/kb/HT3129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3129" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/29637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29637" }, { "reference_url": "http://www.securityfocus.com/bid/29639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29639" }, { "reference_url": "http://www.ubuntu.com/usn/usn-643-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-643-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1794" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1876/references" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2423" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2466", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774", "reference_id": "450774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841", "reference_id": "485841", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808", "reference_id": "CVE-2008-1808", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808" }, { "reference_url": "https://security.gentoo.org/glsa/200806-10", "reference_id": "GLSA-200806-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200806-10" }, { "reference_url": "https://security.gentoo.org/glsa/201209-25", "reference_id": "GLSA-201209-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556", "reference_id": "RHSA-2008:0556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558", "reference_id": "RHSA-2008:0558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0558" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329", "reference_id": "RHSA-2009:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "reference_url": "https://usn.ubuntu.com/643-1/", "reference_id": "USN-643-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/643-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2008-1808" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=api", "vulnerability_id": "VCID-s148-7tzs-gfg8", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25872", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25788", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991", "reference_id": "2077991", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27405" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51301?format=api", "vulnerability_id": "VCID-s3f6-paas-vye4", "summary": "A buffer overflow was discovered in the PCF font parser, potentially\n resulting in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3467", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.9245", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92461", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92472", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08679", "scoring_system": "epss", "scoring_elements": "0.92483", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920", "reference_id": "379920", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353", "reference_id": "383353", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=487070", "reference_id": "487070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487070" }, { "reference_url": "https://security.gentoo.org/glsa/200609-04", "reference_id": "GLSA-200609-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500", "reference_id": "RHSA-2006:0500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0634", "reference_id": "RHSA-2006:0634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0635", "reference_id": "RHSA-2006:0635", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0635" }, { "reference_url": "https://usn.ubuntu.com/324-1/", "reference_id": "USN-324-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/324-1/" }, { "reference_url": "https://usn.ubuntu.com/341-1/", "reference_id": "USN-341-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/341-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571387?format=api", "purl": "pkg:deb/debian/freetype@2.2.1-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-2kj7-a6r9-bfft" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3wjn-8gnc-gkhr" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-5z69-3ht1-kfeh" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qn37-kjm4-tbap" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-rcck-xn4c-k3at" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-txkg-jsdf-93e6" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5" } ], "aliases": [ "CVE-2006-3467" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3f6-paas-vye4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36611?format=api", "vulnerability_id": "VCID-s9u5-4nwv-vudq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82155", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82219", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82213", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37906" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088", "reference_id": "890088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669", "reference_id": "CVE-2012-5669", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0216", "reference_id": "RHSA-2013:0216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0216" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5669" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=api", "vulnerability_id": "VCID-th47-m45d-m7dk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83825", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090", "reference_id": "1191090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9667" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86356?format=api", "vulnerability_id": "VCID-tmb5-g2ua-ekek", "summary": "freetype: OOB stack-based read/write in cf2_hintmap_build()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.6992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.6997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.7", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646", "reference_id": "1074646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299", "reference_id": "741299", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299" }, { "reference_url": "https://usn.ubuntu.com/2148-1/", "reference_id": "USN-2148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2148-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-2241" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=api", "vulnerability_id": "VCID-tsw4-kqbc-kqf1", "summary": "freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72225", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72249", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45955" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788", "reference_id": "1752788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381", "reference_id": "CVE-2015-9381", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9381" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=api", "vulnerability_id": "VCID-tu7r-tsp8-73ew", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88751", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88776", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096", "reference_id": "1191096", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9673" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34276?format=api", "vulnerability_id": "VCID-txkg-jsdf-93e6", "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n and Workstation, allowing remote and local attackers to conduct several\n attacks, including privilege escalation, remote execution of arbitrary\n code, and a Denial of Service.", "references": [ { "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716", "reference_id": "", "reference_type": "", "scores": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90071", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90013", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90016", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90048", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90053", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.9006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05336", "scoring_system": "epss", "scoring_elements": "0.90055", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807" }, { "reference_url": "http://secunia.com/advisories/30600", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30600" }, { "reference_url": "http://secunia.com/advisories/30721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30721" }, { "reference_url": "http://secunia.com/advisories/30740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30740" }, { "reference_url": "http://secunia.com/advisories/30766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30766" }, { "reference_url": "http://secunia.com/advisories/30819", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30819" }, { "reference_url": "http://secunia.com/advisories/30821", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30821" }, { "reference_url": "http://secunia.com/advisories/30967", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30967" }, { "reference_url": "http://secunia.com/advisories/31479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31479" }, { "reference_url": "http://secunia.com/advisories/31577", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31577" }, { "reference_url": "http://secunia.com/advisories/31707", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31707" }, { "reference_url": "http://secunia.com/advisories/31709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31709" }, { "reference_url": "http://secunia.com/advisories/31711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31711" }, { "reference_url": "http://secunia.com/advisories/31712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31712" }, { "reference_url": "http://secunia.com/advisories/31823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31823" }, { "reference_url": "http://secunia.com/advisories/31856", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31856" }, { "reference_url": "http://secunia.com/advisories/31900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31900" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "reference_url": "http://securitytracker.com/id?1020239", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020239" }, { "reference_url": "https://issues.rpath.com/browse/RPL-2608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-2608" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1" }, { "reference_url": "http://support.apple.com/kb/HT3026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3026" }, { "reference_url": "http://support.apple.com/kb/HT3129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3129" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/29641", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29641" }, { "reference_url": "http://www.ubuntu.com/usn/usn-643-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-643-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html" }, { "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html" }, { "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html" }, { "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html" }, { "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html" }, { "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1794", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1794" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1876/references" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2423" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2466", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2466" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2525" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2558", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773", "reference_id": "450773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841", "reference_id": "485841", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807", "reference_id": "CVE-2008-1807", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807" }, { "reference_url": "https://security.gentoo.org/glsa/200806-10", "reference_id": "GLSA-200806-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200806-10" }, { "reference_url": "https://security.gentoo.org/glsa/201209-25", "reference_id": "GLSA-201209-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-25" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556", "reference_id": "RHSA-2008:0556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558", "reference_id": "RHSA-2008:0558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0558" }, { "reference_url": "https://usn.ubuntu.com/643-1/", "reference_id": "USN-643-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/643-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571389?format=api", "purl": "pkg:deb/debian/freetype@2.3.7-2%2Blenny8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-3vb1-m8xt-kfcf" }, { "vulnerability": "VCID-3xz8-4wu5-fugq" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-48rk-qwp7-j7a8" }, { "vulnerability": "VCID-4wp3-qsuc-1kh9" }, { "vulnerability": "VCID-57th-r73p-a3fy" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-64dt-nnzb-mkfc" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-7698-fwj1-fufd" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ahxa-yjxp-a7en" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-bt31-xk8r-8qd2" }, { "vulnerability": "VCID-cwfg-1d6f-hfgg" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-f9ym-em5n-87ep" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcht-dzky-fbay" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gmk4-9sks-s3a5" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-pzsb-3h3d-t7hq" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-tyhk-9jvd-y7bj" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-vykx-mb8e-hyfv" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wbve-vpw4-tqhe" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-yq1k-j2t6-e7g5" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zn5p-qvxr-fqhx" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8" } ], "aliases": [ "CVE-2008-1807" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35789?format=api", "vulnerability_id": "VCID-tyhk-9jvd-y7bj", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86912", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86902", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30361" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198", "reference_id": "613198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520", "reference_id": "CVE-2010-2520", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2520" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=api", "vulnerability_id": "VCID-u15r-u7zz-17ad", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095", "reference_id": "1191095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9672" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=api", "vulnerability_id": "VCID-uh3u-pzzg-fkgg", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89613", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89664", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083", "reference_id": "1191083", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9661" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=api", "vulnerability_id": "VCID-uhnk-v91u-p7e5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8527", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078", "reference_id": "1191078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9656" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=api", "vulnerability_id": "VCID-uy24-k7je-pyhr", "summary": "A vulnerability has been discovered in FreeType, which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98462", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98468", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357", "reference_id": "2351357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357" }, { "reference_url": "https://security.archlinux.org/ASA-202505-11", "reference_id": "ASA-202505-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202505-11" }, { "reference_url": "https://security.archlinux.org/AVG-2877", "reference_id": "AVG-2877", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2877" }, { "reference_url": "https://www.facebook.com/security/advisories/cve-2025-27363", "reference_id": "cve-2025-27363", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/" } ], "url": "https://www.facebook.com/security/advisories/cve-2025-27363" }, { "reference_url": "https://security.gentoo.org/glsa/202505-07", "reference_id": "GLSA-202505-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3382", "reference_id": "RHSA-2025:3382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3383", "reference_id": "RHSA-2025:3383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3384", "reference_id": "RHSA-2025:3384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3385", "reference_id": "RHSA-2025:3385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3386", "reference_id": "RHSA-2025:3386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3387", "reference_id": "RHSA-2025:3387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3393", "reference_id": "RHSA-2025:3393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3395", "reference_id": "RHSA-2025:3395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3407", "reference_id": "RHSA-2025:3407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3421", "reference_id": "RHSA-2025:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8195", "reference_id": "RHSA-2025:8195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8219", "reference_id": "RHSA-2025:8219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8253", "reference_id": "RHSA-2025:8253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8292", "reference_id": "RHSA-2025:8292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9380", "reference_id": "RHSA-2025:9380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9380" }, { "reference_url": "https://usn.ubuntu.com/7352-1/", "reference_id": "USN-7352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1056064?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4" } ], "aliases": [ "CVE-2025-27363" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35804?format=api", "vulnerability_id": "VCID-v6um-wgpt-myax", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91116", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91125", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91148", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122", "reference_id": "649122", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799", "reference_id": "753799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1455", "reference_id": "RHSA-2011:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-3439" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35781?format=api", "vulnerability_id": "VCID-vykx-mb8e-hyfv", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "reference_url": "http://osvdb.org/66828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/66828" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98245", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98254", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98257", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" }, { "reference_url": "http://secunia.com/advisories/40807", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40807" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "http://support.apple.com/kb/HT4291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4291" }, { "reference_url": "http://support.apple.com/kb/HT4292", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4292" }, { "reference_url": "http://www.exploit-db.com/exploits/14538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/14538" }, { "reference_url": "http://www.f-secure.com/weblog/archives/00002002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "reference_url": "http://www.securityfocus.com/bid/42151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42151" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144", "reference_id": "621144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797", "reference_id": "CVE-2010-1797", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py", "reference_id": "CVE-2010-1797;OSVDB-66828", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt", "reference_id": "CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0607", "reference_id": "RHSA-2010:0607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0607" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-1797" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=api", "vulnerability_id": "VCID-wapu-grak-1bca", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90558", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592", "reference_id": "800592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134", "reference_id": "CVE-2012-1134", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1134" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=api", "vulnerability_id": "VCID-wbve-vpw4-tqhe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30306", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30306" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194", "reference_id": "613194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519", "reference_id": "CVE-2010-2519", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2519" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=api", "vulnerability_id": "VCID-wr9p-x4sm-aqdh", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73951", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73984", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99091", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99091" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073", "reference_id": "1446073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308", "reference_id": "861308", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287", "reference_id": "CVE-2017-8287", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8287" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=api", "vulnerability_id": "VCID-xb9q-dk8j-fbch", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31668", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989", "reference_id": "2077989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27404" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=api", "vulnerability_id": "VCID-xe45-fv7j-4ucr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86784", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581", "reference_id": "800581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126", "reference_id": "CVE-2012-1126", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1126" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36610?format=api", "vulnerability_id": "VCID-xyay-hhmw-cyb1", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.8616", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86146", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86142", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37905" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087", "reference_id": "890087", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668", "reference_id": "CVE-2012-5668", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5668" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=api", "vulnerability_id": "VCID-y4qf-qfbv-mqdg", "summary": "freetype: NULL pointer dereference in the Ins_GETVARIATION() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.4916", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49181", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49098", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771", "reference_id": "1544771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450", "reference_id": "890450", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450" }, { "reference_url": "https://security.archlinux.org/ASA-201805-3", "reference_id": "ASA-201805-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-3" }, { "reference_url": "https://security.archlinux.org/AVG-613", "reference_id": "AVG-613", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-613" }, { "reference_url": "https://usn.ubuntu.com/3572-1/", "reference_id": "USN-3572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3572-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" } ], "aliases": [ "CVE-2018-6942" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35797?format=api", "vulnerability_id": "VCID-yq1k-j2t6-e7g5", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.8233", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82226", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.8228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82295", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630", "reference_id": "625630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053", "reference_id": "CVE-2010-3053", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-3053" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=api", "vulnerability_id": "VCID-ysfs-xxjz-vbep", "summary": "freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74003", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74017", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45922" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609", "reference_id": "1763609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382", "reference_id": "CVE-2015-9382", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9382" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35792?format=api", "vulnerability_id": "VCID-zn5p-qvxr-fqhx", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90305", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90347", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30644" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626", "reference_id": "625626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805", "reference_id": "CVE-2010-2805", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571390?format=api", "purl": "pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1teu-tz69-dff8" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-2fsn-uxp3-fbeg" }, { "vulnerability": "VCID-38u1-6t8n-gqey" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-5rpx-8t3t-syhv" }, { "vulnerability": "VCID-613j-8z2t-t3au" }, { "vulnerability": "VCID-6pzj-1sgf-zbbr" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-6z8y-k8vw-nudd" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-79js-ywyp-x3au" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-d2v4-gm58-uyby" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-edag-8pt8-jqdw" }, { "vulnerability": "VCID-ettc-tamy-kfcf" }, { "vulnerability": "VCID-ewj8-a9c8-w3dy" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gcr7-xxtw-e3bs" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-h7qy-dusf-tqb7" }, { "vulnerability": "VCID-hgkz-p83z-ybfe" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-jwbe-5wmu-uqgp" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-mv93-73qb-ekgt" }, { "vulnerability": "VCID-n99m-fgj7-y3bk" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-qu13-pxwm-d3da" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-s9u5-4nwv-vudq" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-v6um-wgpt-myax" }, { "vulnerability": "VCID-wapu-grak-1bca" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-xe45-fv7j-4ucr" }, { "vulnerability": "VCID-xyay-hhmw-cyb1" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" }, { "vulnerability": "VCID-zu7v-a14h-2ueu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4" } ], "aliases": [ "CVE-2010-2805" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=api", "vulnerability_id": "VCID-zpnw-kwqf-63bp", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78016", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747", "reference_id": "CVE-2014-9747", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9747" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=api", "vulnerability_id": "VCID-zu7v-a14h-2ueu", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594", "reference_id": "800594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136", "reference_id": "CVE-2012-1136", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1136" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@1.3.1-1" }