Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
Typedeb
Namespacedebian
Namefreetype
Version2.4.2-2.1+squeeze4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Latest_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Affected_by_vulnerabilities
0
url VCID-17au-pc1k-m7at
vulnerability_id VCID-17au-pc1k-m7at
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9662
reference_id
reference_type
scores
0
value 0.05416
scoring_system epss
scoring_elements 0.90103
published_at 2026-04-01T12:55:00Z
1
value 0.05416
scoring_system epss
scoring_elements 0.90106
published_at 2026-04-02T12:55:00Z
2
value 0.05416
scoring_system epss
scoring_elements 0.90118
published_at 2026-04-04T12:55:00Z
3
value 0.05416
scoring_system epss
scoring_elements 0.90122
published_at 2026-04-07T12:55:00Z
4
value 0.05416
scoring_system epss
scoring_elements 0.90138
published_at 2026-04-08T12:55:00Z
5
value 0.05416
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-09T12:55:00Z
6
value 0.05416
scoring_system epss
scoring_elements 0.90152
published_at 2026-04-11T12:55:00Z
7
value 0.05416
scoring_system epss
scoring_elements 0.90151
published_at 2026-04-12T12:55:00Z
8
value 0.05416
scoring_system epss
scoring_elements 0.90146
published_at 2026-04-13T12:55:00Z
9
value 0.05416
scoring_system epss
scoring_elements 0.90163
published_at 2026-04-18T12:55:00Z
10
value 0.05416
scoring_system epss
scoring_elements 0.9016
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191084
reference_id 1191084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191084
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9662
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at
1
url VCID-1teu-tz69-dff8
vulnerability_id VCID-1teu-tz69-dff8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
reference_id
reference_type
scores
0
value 0.02697
scoring_system epss
scoring_elements 0.85888
published_at 2026-04-21T12:55:00Z
1
value 0.02697
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-01T12:55:00Z
2
value 0.02697
scoring_system epss
scoring_elements 0.85816
published_at 2026-04-02T12:55:00Z
3
value 0.02697
scoring_system epss
scoring_elements 0.85834
published_at 2026-04-04T12:55:00Z
4
value 0.02697
scoring_system epss
scoring_elements 0.85838
published_at 2026-04-07T12:55:00Z
5
value 0.02697
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-08T12:55:00Z
6
value 0.02697
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-09T12:55:00Z
7
value 0.02697
scoring_system epss
scoring_elements 0.85881
published_at 2026-04-11T12:55:00Z
8
value 0.02697
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-12T12:55:00Z
9
value 0.02697
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-13T12:55:00Z
10
value 0.02697
scoring_system epss
scoring_elements 0.85892
published_at 2026-04-16T12:55:00Z
11
value 0.02697
scoring_system epss
scoring_elements 0.85897
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800584
reference_id 800584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
reference_id CVE-2012-1128
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1128
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8
2
url VCID-1ws8-ww77-ybah
vulnerability_id VCID-1ws8-ww77-ybah
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9674
reference_id
reference_type
scores
0
value 0.05124
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-01T12:55:00Z
1
value 0.05124
scoring_system epss
scoring_elements 0.89818
published_at 2026-04-02T12:55:00Z
2
value 0.05124
scoring_system epss
scoring_elements 0.89832
published_at 2026-04-04T12:55:00Z
3
value 0.05124
scoring_system epss
scoring_elements 0.89837
published_at 2026-04-07T12:55:00Z
4
value 0.05124
scoring_system epss
scoring_elements 0.89854
published_at 2026-04-08T12:55:00Z
5
value 0.05124
scoring_system epss
scoring_elements 0.8986
published_at 2026-04-09T12:55:00Z
6
value 0.05124
scoring_system epss
scoring_elements 0.89866
published_at 2026-04-11T12:55:00Z
7
value 0.05124
scoring_system epss
scoring_elements 0.89864
published_at 2026-04-12T12:55:00Z
8
value 0.05124
scoring_system epss
scoring_elements 0.89858
published_at 2026-04-13T12:55:00Z
9
value 0.05124
scoring_system epss
scoring_elements 0.89871
published_at 2026-04-18T12:55:00Z
10
value 0.05124
scoring_system epss
scoring_elements 0.89865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191190
reference_id 1191190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191190
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
7
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9674
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah
3
url VCID-2fsn-uxp3-fbeg
vulnerability_id VCID-2fsn-uxp3-fbeg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800587
reference_id 800587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800587
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
reference_id CVE-2012-1130
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1130
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg
4
url VCID-38u1-6t8n-gqey
vulnerability_id VCID-38u1-6t8n-gqey
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
reference_id
reference_type
scores
0
value 0.02148
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-21T12:55:00Z
1
value 0.02148
scoring_system epss
scoring_elements 0.84163
published_at 2026-04-01T12:55:00Z
2
value 0.02148
scoring_system epss
scoring_elements 0.84177
published_at 2026-04-02T12:55:00Z
3
value 0.02148
scoring_system epss
scoring_elements 0.84195
published_at 2026-04-04T12:55:00Z
4
value 0.02148
scoring_system epss
scoring_elements 0.84196
published_at 2026-04-07T12:55:00Z
5
value 0.02148
scoring_system epss
scoring_elements 0.84218
published_at 2026-04-08T12:55:00Z
6
value 0.02148
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-09T12:55:00Z
7
value 0.02148
scoring_system epss
scoring_elements 0.84242
published_at 2026-04-11T12:55:00Z
8
value 0.02148
scoring_system epss
scoring_elements 0.84236
published_at 2026-04-12T12:55:00Z
9
value 0.02148
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-13T12:55:00Z
10
value 0.02148
scoring_system epss
scoring_elements 0.84255
published_at 2026-04-16T12:55:00Z
11
value 0.02148
scoring_system epss
scoring_elements 0.84256
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800606
reference_id 800606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
reference_id CVE-2012-1143
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1143
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey
5
url VCID-3jn7-t1f6-uyfr
vulnerability_id VCID-3jn7-t1f6-uyfr
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9657
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81172
published_at 2026-04-01T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-02T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81204
published_at 2026-04-07T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81232
published_at 2026-04-08T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-09T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-11T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-12T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.81236
published_at 2026-04-13T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81272
published_at 2026-04-16T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81274
published_at 2026-04-18T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191079
reference_id 1191079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191079
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9657
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr
6
url VCID-468g-dxsr-8yer
vulnerability_id VCID-468g-dxsr-8yer
summary
A vulnerability in FreeType could result in execution of arbitrary
    code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2240
reference_id
reference_type
scores
0
value 0.01867
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-01T12:55:00Z
1
value 0.01867
scoring_system epss
scoring_elements 0.83028
published_at 2026-04-02T12:55:00Z
2
value 0.01867
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-04T12:55:00Z
3
value 0.01867
scoring_system epss
scoring_elements 0.8304
published_at 2026-04-07T12:55:00Z
4
value 0.01867
scoring_system epss
scoring_elements 0.83065
published_at 2026-04-08T12:55:00Z
5
value 0.01867
scoring_system epss
scoring_elements 0.83072
published_at 2026-04-09T12:55:00Z
6
value 0.01867
scoring_system epss
scoring_elements 0.83088
published_at 2026-04-11T12:55:00Z
7
value 0.01867
scoring_system epss
scoring_elements 0.83082
published_at 2026-04-12T12:55:00Z
8
value 0.01867
scoring_system epss
scoring_elements 0.83078
published_at 2026-04-13T12:55:00Z
9
value 0.01867
scoring_system epss
scoring_elements 0.83116
published_at 2026-04-18T12:55:00Z
10
value 0.01867
scoring_system epss
scoring_elements 0.83119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
reference_id 1074646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
reference_id 741299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
5
reference_url https://security.gentoo.org/glsa/201408-02
reference_id GLSA-201408-02
reference_type
scores
url https://security.gentoo.org/glsa/201408-02
6
reference_url https://usn.ubuntu.com/2148-1/
reference_id USN-2148-1
reference_type
scores
url https://usn.ubuntu.com/2148-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-2240
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer
7
url VCID-5rpx-8t3t-syhv
vulnerability_id VCID-5rpx-8t3t-syhv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800598
reference_id 800598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800598
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
reference_id CVE-2012-1139
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1139
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv
8
url VCID-613j-8z2t-t3au
vulnerability_id VCID-613j-8z2t-t3au
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800585
reference_id 800585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800585
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
reference_id CVE-2012-1129
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1129
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au
9
url VCID-6pzj-1sgf-zbbr
vulnerability_id VCID-6pzj-1sgf-zbbr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800607
reference_id 800607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800607
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
reference_id CVE-2012-1144
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1144
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr
10
url VCID-6xf8-49hw-hfaf
vulnerability_id VCID-6xf8-49hw-hfaf
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66463
published_at 2026-04-01T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66502
published_at 2026-04-02T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66527
published_at 2026-04-04T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66499
published_at 2026-04-07T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-08T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66561
published_at 2026-04-09T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.6658
published_at 2026-04-11T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66568
published_at 2026-04-12T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66536
published_at 2026-04-13T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-21T12:55:00Z
10
value 0.00513
scoring_system epss
scoring_elements 0.66589
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
reference_id 1429965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
reference_id 856971
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
8
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
9
reference_url https://usn.ubuntu.com/3237-1/
reference_id USN-3237-1
reference_type
scores
url https://usn.ubuntu.com/3237-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2016-10244
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf
11
url VCID-6z8y-k8vw-nudd
vulnerability_id VCID-6z8y-k8vw-nudd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800604
reference_id 800604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800604
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
reference_id CVE-2012-1142
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1142
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd
12
url VCID-73d5-ezt5-87eh
vulnerability_id VCID-73d5-ezt5-87eh
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9663
reference_id
reference_type
scores
0
value 0.02607
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-01T12:55:00Z
1
value 0.02607
scoring_system epss
scoring_elements 0.85571
published_at 2026-04-02T12:55:00Z
2
value 0.02607
scoring_system epss
scoring_elements 0.85588
published_at 2026-04-04T12:55:00Z
3
value 0.02607
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-07T12:55:00Z
4
value 0.02607
scoring_system epss
scoring_elements 0.85612
published_at 2026-04-08T12:55:00Z
5
value 0.02607
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-09T12:55:00Z
6
value 0.02607
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-11T12:55:00Z
7
value 0.02607
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-12T12:55:00Z
8
value 0.02607
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-13T12:55:00Z
9
value 0.02607
scoring_system epss
scoring_elements 0.85653
published_at 2026-04-16T12:55:00Z
10
value 0.02607
scoring_system epss
scoring_elements 0.85658
published_at 2026-04-18T12:55:00Z
11
value 0.02607
scoring_system epss
scoring_elements 0.85654
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191085
reference_id 1191085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191085
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9663
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh
13
url VCID-73e1-scax-8ugj
vulnerability_id VCID-73e1-scax-8ugj
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9675
reference_id
reference_type
scores
0
value 0.02114
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-01T12:55:00Z
1
value 0.02114
scoring_system epss
scoring_elements 0.84063
published_at 2026-04-02T12:55:00Z
2
value 0.02114
scoring_system epss
scoring_elements 0.8408
published_at 2026-04-04T12:55:00Z
3
value 0.02114
scoring_system epss
scoring_elements 0.84082
published_at 2026-04-07T12:55:00Z
4
value 0.02114
scoring_system epss
scoring_elements 0.84105
published_at 2026-04-08T12:55:00Z
5
value 0.02114
scoring_system epss
scoring_elements 0.84111
published_at 2026-04-09T12:55:00Z
6
value 0.02114
scoring_system epss
scoring_elements 0.84129
published_at 2026-04-11T12:55:00Z
7
value 0.02114
scoring_system epss
scoring_elements 0.84123
published_at 2026-04-12T12:55:00Z
8
value 0.02114
scoring_system epss
scoring_elements 0.84119
published_at 2026-04-13T12:55:00Z
9
value 0.02114
scoring_system epss
scoring_elements 0.84141
published_at 2026-04-16T12:55:00Z
10
value 0.02114
scoring_system epss
scoring_elements 0.84142
published_at 2026-04-18T12:55:00Z
11
value 0.02114
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9675
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191192
reference_id 1191192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191192
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9675
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj
14
url VCID-79js-ywyp-x3au
vulnerability_id VCID-79js-ywyp-x3au
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0226
reference_id
reference_type
scores
0
value 0.10653
scoring_system epss
scoring_elements 0.93274
published_at 2026-04-01T12:55:00Z
1
value 0.10653
scoring_system epss
scoring_elements 0.93283
published_at 2026-04-02T12:55:00Z
2
value 0.10653
scoring_system epss
scoring_elements 0.93289
published_at 2026-04-04T12:55:00Z
3
value 0.10653
scoring_system epss
scoring_elements 0.93288
published_at 2026-04-07T12:55:00Z
4
value 0.10653
scoring_system epss
scoring_elements 0.93296
published_at 2026-04-08T12:55:00Z
5
value 0.10653
scoring_system epss
scoring_elements 0.93301
published_at 2026-04-09T12:55:00Z
6
value 0.10653
scoring_system epss
scoring_elements 0.93305
published_at 2026-04-11T12:55:00Z
7
value 0.10653
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-12T12:55:00Z
8
value 0.10653
scoring_system epss
scoring_elements 0.93304
published_at 2026-04-13T12:55:00Z
9
value 0.10653
scoring_system epss
scoring_elements 0.93322
published_at 2026-04-16T12:55:00Z
10
value 0.10653
scoring_system epss
scoring_elements 0.93327
published_at 2026-04-18T12:55:00Z
11
value 0.10653
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871
reference_id 635871
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722701
reference_id 722701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722701
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1085
reference_id RHSA-2011:1085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1085
7
reference_url https://usn.ubuntu.com/1173-1/
reference_id USN-1173-1
reference_type
scores
url https://usn.ubuntu.com/1173-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2011-0226
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au
15
url VCID-a9r6-k8gp-nbfs
vulnerability_id VCID-a9r6-k8gp-nbfs
summary freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
reference_id
reference_type
scores
0
value 0.02734
scoring_system epss
scoring_elements 0.85895
published_at 2026-04-01T12:55:00Z
1
value 0.02734
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-21T12:55:00Z
2
value 0.02734
scoring_system epss
scoring_elements 0.85961
published_at 2026-04-13T12:55:00Z
3
value 0.02734
scoring_system epss
scoring_elements 0.8598
published_at 2026-04-16T12:55:00Z
4
value 0.02734
scoring_system epss
scoring_elements 0.85984
published_at 2026-04-18T12:55:00Z
5
value 0.02734
scoring_system epss
scoring_elements 0.85906
published_at 2026-04-02T12:55:00Z
6
value 0.02734
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-04T12:55:00Z
7
value 0.02734
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-07T12:55:00Z
8
value 0.02734
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-08T12:55:00Z
9
value 0.02734
scoring_system epss
scoring_elements 0.85954
published_at 2026-04-09T12:55:00Z
10
value 0.02734
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-11T12:55:00Z
11
value 0.02734
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?46346
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?46346
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
reference_id 1763613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
reference_id CVE-2015-9383
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
14
reference_url https://usn.ubuntu.com/4126-1/
reference_id USN-4126-1
reference_type
scores
url https://usn.ubuntu.com/4126-1/
15
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9383
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs
16
url VCID-ask2-xeb7-7qbk
vulnerability_id VCID-ask2-xeb7-7qbk
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9671
reference_id
reference_type
scores
0
value 0.03218
scoring_system epss
scoring_elements 0.86989
published_at 2026-04-01T12:55:00Z
1
value 0.03218
scoring_system epss
scoring_elements 0.87
published_at 2026-04-02T12:55:00Z
2
value 0.03218
scoring_system epss
scoring_elements 0.87019
published_at 2026-04-04T12:55:00Z
3
value 0.03218
scoring_system epss
scoring_elements 0.87012
published_at 2026-04-07T12:55:00Z
4
value 0.03218
scoring_system epss
scoring_elements 0.87032
published_at 2026-04-08T12:55:00Z
5
value 0.03218
scoring_system epss
scoring_elements 0.8704
published_at 2026-04-09T12:55:00Z
6
value 0.03218
scoring_system epss
scoring_elements 0.87053
published_at 2026-04-11T12:55:00Z
7
value 0.03218
scoring_system epss
scoring_elements 0.87048
published_at 2026-04-12T12:55:00Z
8
value 0.03218
scoring_system epss
scoring_elements 0.87042
published_at 2026-04-13T12:55:00Z
9
value 0.03218
scoring_system epss
scoring_elements 0.87058
published_at 2026-04-21T12:55:00Z
10
value 0.03218
scoring_system epss
scoring_elements 0.87062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191094
reference_id 1191094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191094
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9671
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk
17
url VCID-b35u-t7u2-sudy
vulnerability_id VCID-b35u-t7u2-sudy
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
reference_id
reference_type
scores
0
value 0.00842
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-21T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74764
published_at 2026-04-16T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74771
published_at 2026-04-18T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74684
published_at 2026-04-01T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-07T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74714
published_at 2026-04-04T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.7472
published_at 2026-04-08T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.74734
published_at 2026-04-09T12:55:00Z
8
value 0.00842
scoring_system epss
scoring_elements 0.74757
published_at 2026-04-11T12:55:00Z
9
value 0.00842
scoring_system epss
scoring_elements 0.74736
published_at 2026-04-12T12:55:00Z
10
value 0.00842
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
reference_id CVE-2014-9746
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9746
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy
18
url VCID-d2v4-gm58-uyby
vulnerability_id VCID-d2v4-gm58-uyby
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800600
reference_id 800600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
reference_id CVE-2012-1140
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1140
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby
19
url VCID-dcxj-zzfj-3bg7
vulnerability_id VCID-dcxj-zzfj-3bg7
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35967
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35996
published_at 2026-04-04T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35878
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35901
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35865
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35842
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35869
published_at 2026-04-18T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
reference_id 2077985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5453-1/
reference_id USN-5453-1
reference_type
scores
url https://usn.ubuntu.com/5453-1/
11
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
12
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27406
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7
20
url VCID-edag-8pt8-jqdw
vulnerability_id VCID-edag-8pt8-jqdw
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800595
reference_id 800595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
reference_id CVE-2012-1137
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1137
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw
21
url VCID-ettc-tamy-kfcf
vulnerability_id VCID-ettc-tamy-kfcf
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800591
reference_id 800591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800591
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
reference_id CVE-2012-1133
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1133
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf
22
url VCID-ewj8-a9c8-w3dy
vulnerability_id VCID-ewj8-a9c8-w3dy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800593
reference_id 800593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800593
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
reference_id CVE-2012-1135
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1135
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy
23
url VCID-fp2p-5ymf-wffj
vulnerability_id VCID-fp2p-5ymf-wffj
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9669
reference_id
reference_type
scores
0
value 0.02443
scoring_system epss
scoring_elements 0.8511
published_at 2026-04-01T12:55:00Z
1
value 0.02443
scoring_system epss
scoring_elements 0.85123
published_at 2026-04-02T12:55:00Z
2
value 0.02443
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-04T12:55:00Z
3
value 0.02443
scoring_system epss
scoring_elements 0.85144
published_at 2026-04-07T12:55:00Z
4
value 0.02443
scoring_system epss
scoring_elements 0.85166
published_at 2026-04-08T12:55:00Z
5
value 0.02443
scoring_system epss
scoring_elements 0.85174
published_at 2026-04-09T12:55:00Z
6
value 0.02443
scoring_system epss
scoring_elements 0.85188
published_at 2026-04-11T12:55:00Z
7
value 0.02443
scoring_system epss
scoring_elements 0.85186
published_at 2026-04-12T12:55:00Z
8
value 0.02443
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-13T12:55:00Z
9
value 0.02443
scoring_system epss
scoring_elements 0.85204
published_at 2026-04-21T12:55:00Z
10
value 0.02443
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9669
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191092
reference_id 1191092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191092
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9669
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj
24
url VCID-gcr7-xxtw-e3bs
vulnerability_id VCID-gcr7-xxtw-e3bs
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3256
reference_id
reference_type
scores
0
value 0.02511
scoring_system epss
scoring_elements 0.85299
published_at 2026-04-01T12:55:00Z
1
value 0.02511
scoring_system epss
scoring_elements 0.85311
published_at 2026-04-02T12:55:00Z
2
value 0.02511
scoring_system epss
scoring_elements 0.8533
published_at 2026-04-04T12:55:00Z
3
value 0.02511
scoring_system epss
scoring_elements 0.85331
published_at 2026-04-07T12:55:00Z
4
value 0.02511
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-08T12:55:00Z
5
value 0.02511
scoring_system epss
scoring_elements 0.85362
published_at 2026-04-09T12:55:00Z
6
value 0.02511
scoring_system epss
scoring_elements 0.85376
published_at 2026-04-11T12:55:00Z
7
value 0.02511
scoring_system epss
scoring_elements 0.85374
published_at 2026-04-12T12:55:00Z
8
value 0.02511
scoring_system epss
scoring_elements 0.85371
published_at 2026-04-13T12:55:00Z
9
value 0.03238
scoring_system epss
scoring_elements 0.87114
published_at 2026-04-21T12:55:00Z
10
value 0.03238
scoring_system epss
scoring_elements 0.87118
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3256
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120
reference_id 646120
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=746226
reference_id 746226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=746226
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1402
reference_id RHSA-2011:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1402
7
reference_url https://access.redhat.com/errata/RHSA-2012:0094
reference_id RHSA-2012:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0094
8
reference_url https://usn.ubuntu.com/1267-1/
reference_id USN-1267-1
reference_type
scores
url https://usn.ubuntu.com/1267-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2011-3256
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs
25
url VCID-gtka-sbgw-tuf5
vulnerability_id VCID-gtka-sbgw-tuf5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9665
reference_id
reference_type
scores
0
value 0.04321
scoring_system epss
scoring_elements 0.88852
published_at 2026-04-01T12:55:00Z
1
value 0.04321
scoring_system epss
scoring_elements 0.8886
published_at 2026-04-02T12:55:00Z
2
value 0.04321
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-04T12:55:00Z
3
value 0.04321
scoring_system epss
scoring_elements 0.88878
published_at 2026-04-07T12:55:00Z
4
value 0.04321
scoring_system epss
scoring_elements 0.88896
published_at 2026-04-08T12:55:00Z
5
value 0.04321
scoring_system epss
scoring_elements 0.88902
published_at 2026-04-09T12:55:00Z
6
value 0.04321
scoring_system epss
scoring_elements 0.88913
published_at 2026-04-11T12:55:00Z
7
value 0.04321
scoring_system epss
scoring_elements 0.88908
published_at 2026-04-12T12:55:00Z
8
value 0.04321
scoring_system epss
scoring_elements 0.88907
published_at 2026-04-13T12:55:00Z
9
value 0.04321
scoring_system epss
scoring_elements 0.88921
published_at 2026-04-16T12:55:00Z
10
value 0.04321
scoring_system epss
scoring_elements 0.88919
published_at 2026-04-18T12:55:00Z
11
value 0.04321
scoring_system epss
scoring_elements 0.88915
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191087
reference_id 1191087
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191087
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9665
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5
26
url VCID-h7qy-dusf-tqb7
vulnerability_id VCID-h7qy-dusf-tqb7
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800602
reference_id 800602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
reference_id CVE-2012-1141
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1141
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7
27
url VCID-hgkz-p83z-ybfe
vulnerability_id VCID-hgkz-p83z-ybfe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800583
reference_id 800583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800583
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
reference_id CVE-2012-1127
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1127
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe
28
url VCID-hutw-rk7x-5bc3
vulnerability_id VCID-hutw-rk7x-5bc3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
reference_id
reference_type
scores
0
value 0.02361
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-07T12:55:00Z
1
value 0.02361
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-01T12:55:00Z
2
value 0.02361
scoring_system epss
scoring_elements 0.84869
published_at 2026-04-02T12:55:00Z
3
value 0.02361
scoring_system epss
scoring_elements 0.84887
published_at 2026-04-04T12:55:00Z
4
value 0.02908
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-12T12:55:00Z
5
value 0.02908
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-13T12:55:00Z
6
value 0.02908
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-16T12:55:00Z
7
value 0.02908
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-18T12:55:00Z
8
value 0.02908
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-21T12:55:00Z
9
value 0.02908
scoring_system epss
scoring_elements 0.86349
published_at 2026-04-08T12:55:00Z
10
value 0.02908
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-09T12:55:00Z
11
value 0.02908
scoring_system epss
scoring_elements 0.86373
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
reference_id 1262377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
reference_id 798620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
8
reference_url https://usn.ubuntu.com/2739-1/
reference_id USN-2739-1
reference_type
scores
url https://usn.ubuntu.com/2739-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9745
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3
29
url VCID-jg4p-nv1j-fyb9
vulnerability_id VCID-jg4p-nv1j-fyb9
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9670
reference_id
reference_type
scores
0
value 0.05048
scoring_system epss
scoring_elements 0.89729
published_at 2026-04-01T12:55:00Z
1
value 0.05048
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-02T12:55:00Z
2
value 0.05048
scoring_system epss
scoring_elements 0.89746
published_at 2026-04-04T12:55:00Z
3
value 0.05048
scoring_system epss
scoring_elements 0.89748
published_at 2026-04-07T12:55:00Z
4
value 0.05048
scoring_system epss
scoring_elements 0.89765
published_at 2026-04-08T12:55:00Z
5
value 0.05048
scoring_system epss
scoring_elements 0.89772
published_at 2026-04-09T12:55:00Z
6
value 0.05048
scoring_system epss
scoring_elements 0.89778
published_at 2026-04-11T12:55:00Z
7
value 0.05048
scoring_system epss
scoring_elements 0.89777
published_at 2026-04-12T12:55:00Z
8
value 0.05048
scoring_system epss
scoring_elements 0.8977
published_at 2026-04-13T12:55:00Z
9
value 0.05048
scoring_system epss
scoring_elements 0.89786
published_at 2026-04-18T12:55:00Z
10
value 0.05048
scoring_system epss
scoring_elements 0.8978
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191093
reference_id 1191093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191093
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9670
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9
30
url VCID-jn9w-2axj-8ke5
vulnerability_id VCID-jn9w-2axj-8ke5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9659
reference_id
reference_type
scores
0
value 0.02866
scoring_system epss
scoring_elements 0.86198
published_at 2026-04-01T12:55:00Z
1
value 0.02866
scoring_system epss
scoring_elements 0.86208
published_at 2026-04-02T12:55:00Z
2
value 0.02866
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-04T12:55:00Z
3
value 0.02866
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-07T12:55:00Z
4
value 0.02866
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
5
value 0.02866
scoring_system epss
scoring_elements 0.86252
published_at 2026-04-09T12:55:00Z
6
value 0.02866
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-11T12:55:00Z
7
value 0.02866
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
8
value 0.02866
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
9
value 0.02866
scoring_system epss
scoring_elements 0.86275
published_at 2026-04-16T12:55:00Z
10
value 0.02866
scoring_system epss
scoring_elements 0.8628
published_at 2026-04-18T12:55:00Z
11
value 0.02866
scoring_system epss
scoring_elements 0.86273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191081
reference_id 1191081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191081
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084
reference_id 773084
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9659
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5
31
url VCID-jwbe-5wmu-uqgp
vulnerability_id VCID-jwbe-5wmu-uqgp
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800589
reference_id 800589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800589
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
reference_id CVE-2012-1131
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1131
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp
32
url VCID-m8ha-zxb7-tyg6
vulnerability_id VCID-m8ha-zxb7-tyg6
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
reference_id
reference_type
scores
0
value 0.01616
scoring_system epss
scoring_elements 0.81728
published_at 2026-04-01T12:55:00Z
1
value 0.01616
scoring_system epss
scoring_elements 0.81834
published_at 2026-04-21T12:55:00Z
2
value 0.01616
scoring_system epss
scoring_elements 0.81786
published_at 2026-04-08T12:55:00Z
3
value 0.01616
scoring_system epss
scoring_elements 0.81792
published_at 2026-04-09T12:55:00Z
4
value 0.01616
scoring_system epss
scoring_elements 0.81811
published_at 2026-04-11T12:55:00Z
5
value 0.01616
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-12T12:55:00Z
6
value 0.01616
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-13T12:55:00Z
7
value 0.01616
scoring_system epss
scoring_elements 0.81831
published_at 2026-04-18T12:55:00Z
8
value 0.01616
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-02T12:55:00Z
9
value 0.01616
scoring_system epss
scoring_elements 0.81762
published_at 2026-04-04T12:55:00Z
10
value 0.01616
scoring_system epss
scoring_elements 0.8176
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99093
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
reference_id 1446500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
reference_id 861220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
reference_id CVE-2017-8105
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
21
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
22
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
23
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2017-8105
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6
33
url VCID-mv93-73qb-ekgt
vulnerability_id VCID-mv93-73qb-ekgt
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800590
reference_id 800590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
reference_id CVE-2012-1132
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1132
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt
34
url VCID-n99m-fgj7-y3bk
vulnerability_id VCID-n99m-fgj7-y3bk
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800597
reference_id 800597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800597
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
reference_id CVE-2012-1138
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1138
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk
35
url VCID-nakp-vmxa-akey
vulnerability_id VCID-nakp-vmxa-akey
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9664
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78458
published_at 2026-04-01T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78464
published_at 2026-04-02T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78494
published_at 2026-04-04T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78478
published_at 2026-04-07T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78504
published_at 2026-04-08T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.7851
published_at 2026-04-09T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78535
published_at 2026-04-11T12:55:00Z
7
value 0.01153
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-12T12:55:00Z
8
value 0.01153
scoring_system epss
scoring_elements 0.78509
published_at 2026-04-13T12:55:00Z
9
value 0.01153
scoring_system epss
scoring_elements 0.78537
published_at 2026-04-16T12:55:00Z
10
value 0.01153
scoring_system epss
scoring_elements 0.78536
published_at 2026-04-18T12:55:00Z
11
value 0.01153
scoring_system epss
scoring_elements 0.78533
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191086
reference_id 1191086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191086
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9664
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey
36
url VCID-nfp7-sjcv-wkfv
vulnerability_id VCID-nfp7-sjcv-wkfv
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9668
reference_id
reference_type
scores
0
value 0.01723
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-01T12:55:00Z
1
value 0.01723
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-02T12:55:00Z
2
value 0.01723
scoring_system epss
scoring_elements 0.82368
published_at 2026-04-04T12:55:00Z
3
value 0.01723
scoring_system epss
scoring_elements 0.82363
published_at 2026-04-07T12:55:00Z
4
value 0.01723
scoring_system epss
scoring_elements 0.82391
published_at 2026-04-08T12:55:00Z
5
value 0.01723
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-09T12:55:00Z
6
value 0.01723
scoring_system epss
scoring_elements 0.82418
published_at 2026-04-11T12:55:00Z
7
value 0.01723
scoring_system epss
scoring_elements 0.82414
published_at 2026-04-12T12:55:00Z
8
value 0.01723
scoring_system epss
scoring_elements 0.82409
published_at 2026-04-13T12:55:00Z
9
value 0.01723
scoring_system epss
scoring_elements 0.82444
published_at 2026-04-16T12:55:00Z
10
value 0.01723
scoring_system epss
scoring_elements 0.82445
published_at 2026-04-18T12:55:00Z
11
value 0.01723
scoring_system epss
scoring_elements 0.82449
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191091
reference_id 1191091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191091
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9668
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv
37
url VCID-nn4w-gq71-kfgd
vulnerability_id VCID-nn4w-gq71-kfgd
summary freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65886
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65927
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65958
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65924
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.66006
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65993
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65962
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65997
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66011
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.65999
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
reference_id 1741802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9290
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd
38
url VCID-nx21-ks3v-53e4
vulnerability_id VCID-nx21-ks3v-53e4
summary
Heap buffer overflow in CefSharp
### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.

> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ 

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

### Patches
Upgrade to 85.3.130 or higher

### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942

To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
reference_id
reference_type
scores
0
value 0.92905
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-16T12:55:00Z
1
value 0.92905
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-21T12:55:00Z
2
value 0.92905
scoring_system epss
scoring_elements 0.99771
published_at 2026-04-12T12:55:00Z
3
value 0.92931
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-04T12:55:00Z
4
value 0.92931
scoring_system epss
scoring_elements 0.99774
published_at 2026-04-08T12:55:00Z
5
value 0.92931
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
3
reference_url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
4
reference_url https://crbug.com/1139963
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://crbug.com/1139963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
145
reference_url http://seclists.org/fulldisclosure/2020/Nov/33
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://seclists.org/fulldisclosure/2020/Nov/33
146
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
147
reference_url https://github.com/cefsharp/CefSharp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp
148
reference_url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
149
reference_url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
152
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
153
reference_url https://security.gentoo.org/glsa/202011-12
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202011-12
154
reference_url https://security.gentoo.org/glsa/202012-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202012-04
155
reference_url https://security.gentoo.org/glsa/202401-19
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202401-19
156
reference_url https://security.netapp.com/advisory/ntap-20240812-0001
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240812-0001
157
reference_url https://www.debian.org/security/2021/dsa-4824
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://www.debian.org/security/2021/dsa-4824
158
reference_url https://www.nuget.org/packages/CefSharp.Common
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Common
159
reference_url https://www.nuget.org/packages/CefSharp.WinForms
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.WinForms
160
reference_url https://www.nuget.org/packages/CefSharp.Wpf
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf
161
reference_url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
162
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
reference_id 1890210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
163
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
reference_id 972586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
164
reference_url https://security.archlinux.org/ASA-202010-10
reference_id ASA-202010-10
reference_type
scores
url https://security.archlinux.org/ASA-202010-10
165
reference_url https://security.archlinux.org/ASA-202010-11
reference_id ASA-202010-11
reference_type
scores
url https://security.archlinux.org/ASA-202010-11
166
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
167
reference_url https://security.archlinux.org/AVG-1254
reference_id AVG-1254
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1254
168
reference_url https://security.archlinux.org/AVG-1255
reference_id AVG-1255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1255
169
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
170
reference_url https://github.com/advisories/GHSA-pv36-h7jh-qm62
reference_id GHSA-pv36-h7jh-qm62
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv36-h7jh-qm62
171
reference_url https://security.gentoo.org/glsa/202010-07
reference_id GLSA-202010-07
reference_type
scores
url https://security.gentoo.org/glsa/202010-07
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
reference_id J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
173
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
174
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
175
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
176
reference_url https://access.redhat.com/errata/RHSA-2020:4351
reference_id RHSA-2020:4351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4351
177
reference_url https://access.redhat.com/errata/RHSA-2020:4907
reference_id RHSA-2020:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4907
178
reference_url https://access.redhat.com/errata/RHSA-2020:4949
reference_id RHSA-2020:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4949
179
reference_url https://access.redhat.com/errata/RHSA-2020:4950
reference_id RHSA-2020:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4950
180
reference_url https://access.redhat.com/errata/RHSA-2020:4951
reference_id RHSA-2020:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4951
181
reference_url https://access.redhat.com/errata/RHSA-2020:4952
reference_id RHSA-2020:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4952
182
reference_url https://usn.ubuntu.com/4593-1/
reference_id USN-4593-1
reference_type
scores
url https://usn.ubuntu.com/4593-1/
183
reference_url https://usn.ubuntu.com/4593-2/
reference_id USN-4593-2
reference_type
scores
url https://usn.ubuntu.com/4593-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
purl pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2020-15999, GHSA-pv36-h7jh-qm62
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4
39
url VCID-p2yw-ksc4-jfe9
vulnerability_id VCID-p2yw-ksc4-jfe9
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9660
reference_id
reference_type
scores
0
value 0.04849
scoring_system epss
scoring_elements 0.89501
published_at 2026-04-01T12:55:00Z
1
value 0.04849
scoring_system epss
scoring_elements 0.89505
published_at 2026-04-02T12:55:00Z
2
value 0.04849
scoring_system epss
scoring_elements 0.89517
published_at 2026-04-07T12:55:00Z
3
value 0.04849
scoring_system epss
scoring_elements 0.89533
published_at 2026-04-08T12:55:00Z
4
value 0.04849
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-13T12:55:00Z
5
value 0.04849
scoring_system epss
scoring_elements 0.89544
published_at 2026-04-11T12:55:00Z
6
value 0.04849
scoring_system epss
scoring_elements 0.89542
published_at 2026-04-12T12:55:00Z
7
value 0.04849
scoring_system epss
scoring_elements 0.8955
published_at 2026-04-21T12:55:00Z
8
value 0.04849
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191082
reference_id 1191082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191082
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9660
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9
40
url VCID-p8h9-9xku-hbhv
vulnerability_id VCID-p8h9-9xku-hbhv
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9666
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80537
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80544
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80566
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80558
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80597
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80614
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.806
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80624
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80628
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191089
reference_id 1191089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191089
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9666
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv
41
url VCID-pznp-81q7-z3d4
vulnerability_id VCID-pznp-81q7-z3d4
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9658
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81172
published_at 2026-04-01T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-02T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81204
published_at 2026-04-07T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81232
published_at 2026-04-08T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-09T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-11T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-12T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.81236
published_at 2026-04-13T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81272
published_at 2026-04-16T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81274
published_at 2026-04-18T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191080
reference_id 1191080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191080
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9658
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4
42
url VCID-qu13-pxwm-d3da
vulnerability_id VCID-qu13-pxwm-d3da
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5670
reference_id
reference_type
scores
0
value 0.02977
scoring_system epss
scoring_elements 0.86531
published_at 2026-04-21T12:55:00Z
1
value 0.02977
scoring_system epss
scoring_elements 0.86453
published_at 2026-04-01T12:55:00Z
2
value 0.02977
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-02T12:55:00Z
3
value 0.02977
scoring_system epss
scoring_elements 0.86482
published_at 2026-04-04T12:55:00Z
4
value 0.02977
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-07T12:55:00Z
5
value 0.02977
scoring_system epss
scoring_elements 0.86501
published_at 2026-04-08T12:55:00Z
6
value 0.02977
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-09T12:55:00Z
7
value 0.02977
scoring_system epss
scoring_elements 0.86526
published_at 2026-04-11T12:55:00Z
8
value 0.02977
scoring_system epss
scoring_elements 0.86523
published_at 2026-04-12T12:55:00Z
9
value 0.02977
scoring_system epss
scoring_elements 0.86517
published_at 2026-04-13T12:55:00Z
10
value 0.02977
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-16T12:55:00Z
11
value 0.02977
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5670
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
6
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
7
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
8
reference_url https://savannah.nongnu.org/bugs/?37907
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37907
9
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
10
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
11
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
12
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
13
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890094
reference_id 890094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890094
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5670
reference_id CVE-2012-5670
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5670
64
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
65
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-5670
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da
43
url VCID-s148-7tzs-gfg8
vulnerability_id VCID-s148-7tzs-gfg8
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.2582
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25882
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25841
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25788
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25743
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
reference_id 2077991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27405
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8
44
url VCID-s9u5-4nwv-vudq
vulnerability_id VCID-s9u5-4nwv-vudq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0216.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0216.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5669
reference_id
reference_type
scores
0
value 0.01687
scoring_system epss
scoring_elements 0.8225
published_at 2026-04-21T12:55:00Z
1
value 0.01687
scoring_system epss
scoring_elements 0.82142
published_at 2026-04-01T12:55:00Z
2
value 0.01687
scoring_system epss
scoring_elements 0.82155
published_at 2026-04-02T12:55:00Z
3
value 0.01687
scoring_system epss
scoring_elements 0.82177
published_at 2026-04-04T12:55:00Z
4
value 0.01687
scoring_system epss
scoring_elements 0.82173
published_at 2026-04-07T12:55:00Z
5
value 0.01687
scoring_system epss
scoring_elements 0.822
published_at 2026-04-08T12:55:00Z
6
value 0.01687
scoring_system epss
scoring_elements 0.82207
published_at 2026-04-09T12:55:00Z
7
value 0.01687
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-11T12:55:00Z
8
value 0.01687
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-12T12:55:00Z
9
value 0.01687
scoring_system epss
scoring_elements 0.82213
published_at 2026-04-13T12:55:00Z
10
value 0.01687
scoring_system epss
scoring_elements 0.82249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5669
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
8
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
9
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
10
reference_url https://savannah.nongnu.org/bugs/?37906
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37906
11
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
12
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
13
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
14
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
15
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890088
reference_id 890088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890088
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5669
reference_id CVE-2012-5669
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5669
66
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
67
reference_url https://access.redhat.com/errata/RHSA-2013:0216
reference_id RHSA-2013:0216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0216
68
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-5669
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq
45
url VCID-th47-m45d-m7dk
vulnerability_id VCID-th47-m45d-m7dk
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9667
reference_id
reference_type
scores
0
value 0.02029
scoring_system epss
scoring_elements 0.83727
published_at 2026-04-01T12:55:00Z
1
value 0.02029
scoring_system epss
scoring_elements 0.8374
published_at 2026-04-02T12:55:00Z
2
value 0.02029
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-04T12:55:00Z
3
value 0.02029
scoring_system epss
scoring_elements 0.83756
published_at 2026-04-07T12:55:00Z
4
value 0.02029
scoring_system epss
scoring_elements 0.8378
published_at 2026-04-08T12:55:00Z
5
value 0.02029
scoring_system epss
scoring_elements 0.83786
published_at 2026-04-09T12:55:00Z
6
value 0.02029
scoring_system epss
scoring_elements 0.83802
published_at 2026-04-11T12:55:00Z
7
value 0.02029
scoring_system epss
scoring_elements 0.83796
published_at 2026-04-12T12:55:00Z
8
value 0.02029
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-13T12:55:00Z
9
value 0.02029
scoring_system epss
scoring_elements 0.83825
published_at 2026-04-16T12:55:00Z
10
value 0.02029
scoring_system epss
scoring_elements 0.83826
published_at 2026-04-18T12:55:00Z
11
value 0.02029
scoring_system epss
scoring_elements 0.83827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191090
reference_id 1191090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191090
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9667
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk
46
url VCID-tmb5-g2ua-ekek
vulnerability_id VCID-tmb5-g2ua-ekek
summary freetype: OOB stack-based read/write in cf2_hintmap_build()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2241
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69893
published_at 2026-04-01T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69906
published_at 2026-04-02T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.6992
published_at 2026-04-04T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69898
published_at 2026-04-07T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69946
published_at 2026-04-08T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69962
published_at 2026-04-09T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69986
published_at 2026-04-11T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.6997
published_at 2026-04-12T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69957
published_at 2026-04-13T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.7
published_at 2026-04-16T12:55:00Z
10
value 0.00618
scoring_system epss
scoring_elements 0.7001
published_at 2026-04-18T12:55:00Z
11
value 0.00618
scoring_system epss
scoring_elements 0.69992
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
reference_id 1074646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
reference_id 741299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
5
reference_url https://usn.ubuntu.com/2148-1/
reference_id USN-2148-1
reference_type
scores
url https://usn.ubuntu.com/2148-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-2241
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek
47
url VCID-tsw4-kqbc-kqf1
vulnerability_id VCID-tsw4-kqbc-kqf1
summary freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.722
published_at 2026-04-01T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72282
published_at 2026-04-21T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-13T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72285
published_at 2026-04-16T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-18T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72205
published_at 2026-04-02T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72225
published_at 2026-04-04T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-07T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-08T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-09T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-11T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72256
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45955
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45955
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
reference_id 1752788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
reference_id CVE-2015-9381
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9381
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1
48
url VCID-tu7r-tsp8-73ew
vulnerability_id VCID-tu7r-tsp8-73ew
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9673
reference_id
reference_type
scores
0
value 0.04219
scoring_system epss
scoring_elements 0.88707
published_at 2026-04-01T12:55:00Z
1
value 0.04219
scoring_system epss
scoring_elements 0.88717
published_at 2026-04-02T12:55:00Z
2
value 0.04219
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-04T12:55:00Z
3
value 0.04219
scoring_system epss
scoring_elements 0.88734
published_at 2026-04-07T12:55:00Z
4
value 0.04219
scoring_system epss
scoring_elements 0.88751
published_at 2026-04-08T12:55:00Z
5
value 0.04219
scoring_system epss
scoring_elements 0.88756
published_at 2026-04-09T12:55:00Z
6
value 0.04219
scoring_system epss
scoring_elements 0.88768
published_at 2026-04-11T12:55:00Z
7
value 0.04219
scoring_system epss
scoring_elements 0.88763
published_at 2026-04-13T12:55:00Z
8
value 0.04219
scoring_system epss
scoring_elements 0.88776
published_at 2026-04-16T12:55:00Z
9
value 0.04219
scoring_system epss
scoring_elements 0.88774
published_at 2026-04-18T12:55:00Z
10
value 0.04219
scoring_system epss
scoring_elements 0.88772
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191096
reference_id 1191096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191096
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9673
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew
49
url VCID-u15r-u7zz-17ad
vulnerability_id VCID-u15r-u7zz-17ad
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9672
reference_id
reference_type
scores
0
value 0.04704
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-01T12:55:00Z
1
value 0.04704
scoring_system epss
scoring_elements 0.89327
published_at 2026-04-02T12:55:00Z
2
value 0.04704
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-04T12:55:00Z
3
value 0.04704
scoring_system epss
scoring_elements 0.89341
published_at 2026-04-07T12:55:00Z
4
value 0.04704
scoring_system epss
scoring_elements 0.89358
published_at 2026-04-08T12:55:00Z
5
value 0.04704
scoring_system epss
scoring_elements 0.89362
published_at 2026-04-09T12:55:00Z
6
value 0.04704
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-11T12:55:00Z
7
value 0.04704
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-12T12:55:00Z
8
value 0.04704
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-13T12:55:00Z
9
value 0.04704
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-18T12:55:00Z
10
value 0.04704
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9672
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191095
reference_id 1191095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191095
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9672
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad
50
url VCID-uh3u-pzzg-fkgg
vulnerability_id VCID-uh3u-pzzg-fkgg
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9661
reference_id
reference_type
scores
0
value 0.04948
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-01T12:55:00Z
1
value 0.04948
scoring_system epss
scoring_elements 0.89613
published_at 2026-04-02T12:55:00Z
2
value 0.04948
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-04T12:55:00Z
3
value 0.04948
scoring_system epss
scoring_elements 0.89627
published_at 2026-04-07T12:55:00Z
4
value 0.04948
scoring_system epss
scoring_elements 0.89644
published_at 2026-04-08T12:55:00Z
5
value 0.04948
scoring_system epss
scoring_elements 0.89649
published_at 2026-04-09T12:55:00Z
6
value 0.04948
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-11T12:55:00Z
7
value 0.04948
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-12T12:55:00Z
8
value 0.04948
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-13T12:55:00Z
9
value 0.04948
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-16T12:55:00Z
10
value 0.04948
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-18T12:55:00Z
11
value 0.04948
scoring_system epss
scoring_elements 0.89659
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191083
reference_id 1191083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191083
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9661
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg
51
url VCID-uhnk-v91u-p7e5
vulnerability_id VCID-uhnk-v91u-p7e5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9656
reference_id
reference_type
scores
0
value 0.02464
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-01T12:55:00Z
1
value 0.02464
scoring_system epss
scoring_elements 0.85191
published_at 2026-04-02T12:55:00Z
2
value 0.02464
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-04T12:55:00Z
3
value 0.02464
scoring_system epss
scoring_elements 0.8521
published_at 2026-04-07T12:55:00Z
4
value 0.02464
scoring_system epss
scoring_elements 0.85232
published_at 2026-04-08T12:55:00Z
5
value 0.02464
scoring_system epss
scoring_elements 0.8524
published_at 2026-04-09T12:55:00Z
6
value 0.02464
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-11T12:55:00Z
7
value 0.02464
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-12T12:55:00Z
8
value 0.02464
scoring_system epss
scoring_elements 0.8525
published_at 2026-04-13T12:55:00Z
9
value 0.02464
scoring_system epss
scoring_elements 0.8527
published_at 2026-04-21T12:55:00Z
10
value 0.02464
scoring_system epss
scoring_elements 0.85271
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191078
reference_id 1191078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191078
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3
purl pkg:deb/debian/freetype@2.5.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3
aliases CVE-2014-9656
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5
52
url VCID-uy24-k7je-pyhr
vulnerability_id VCID-uy24-k7je-pyhr
summary A vulnerability has been discovered in FreeType, which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
reference_id
reference_type
scores
0
value 0.63439
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-13T12:55:00Z
1
value 0.63439
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-16T12:55:00Z
2
value 0.63439
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-18T12:55:00Z
3
value 0.64976
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-07T12:55:00Z
4
value 0.64976
scoring_system epss
scoring_elements 0.98459
published_at 2026-04-02T12:55:00Z
5
value 0.64976
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-04T12:55:00Z
6
value 0.64976
scoring_system epss
scoring_elements 0.98467
published_at 2026-04-08T12:55:00Z
7
value 0.64976
scoring_system epss
scoring_elements 0.98468
published_at 2026-04-09T12:55:00Z
8
value 0.68721
scoring_system epss
scoring_elements 0.98627
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
reference_id 2351357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
5
reference_url https://security.archlinux.org/ASA-202505-11
reference_id ASA-202505-11
reference_type
scores
url https://security.archlinux.org/ASA-202505-11
6
reference_url https://security.archlinux.org/AVG-2877
reference_id AVG-2877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2877
7
reference_url https://www.facebook.com/security/advisories/cve-2025-27363
reference_id cve-2025-27363
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/
url https://www.facebook.com/security/advisories/cve-2025-27363
8
reference_url https://security.gentoo.org/glsa/202505-07
reference_id GLSA-202505-07
reference_type
scores
url https://security.gentoo.org/glsa/202505-07
9
reference_url https://access.redhat.com/errata/RHSA-2025:3382
reference_id RHSA-2025:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3382
10
reference_url https://access.redhat.com/errata/RHSA-2025:3383
reference_id RHSA-2025:3383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3383
11
reference_url https://access.redhat.com/errata/RHSA-2025:3384
reference_id RHSA-2025:3384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3384
12
reference_url https://access.redhat.com/errata/RHSA-2025:3385
reference_id RHSA-2025:3385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3385
13
reference_url https://access.redhat.com/errata/RHSA-2025:3386
reference_id RHSA-2025:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3386
14
reference_url https://access.redhat.com/errata/RHSA-2025:3387
reference_id RHSA-2025:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3387
15
reference_url https://access.redhat.com/errata/RHSA-2025:3393
reference_id RHSA-2025:3393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3393
16
reference_url https://access.redhat.com/errata/RHSA-2025:3395
reference_id RHSA-2025:3395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3395
17
reference_url https://access.redhat.com/errata/RHSA-2025:3407
reference_id RHSA-2025:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3407
18
reference_url https://access.redhat.com/errata/RHSA-2025:3421
reference_id RHSA-2025:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3421
19
reference_url https://access.redhat.com/errata/RHSA-2025:8195
reference_id RHSA-2025:8195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8195
20
reference_url https://access.redhat.com/errata/RHSA-2025:8219
reference_id RHSA-2025:8219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8219
21
reference_url https://access.redhat.com/errata/RHSA-2025:8253
reference_id RHSA-2025:8253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8253
22
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8292
23
reference_url https://access.redhat.com/errata/RHSA-2025:9380
reference_id RHSA-2025:9380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9380
24
reference_url https://usn.ubuntu.com/7352-1/
reference_id USN-7352-1
reference_type
scores
url https://usn.ubuntu.com/7352-1/
25
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4
aliases CVE-2025-27363
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr
53
url VCID-v6um-wgpt-myax
vulnerability_id VCID-v6um-wgpt-myax
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3439
reference_id
reference_type
scores
0
value 0.06537
scoring_system epss
scoring_elements 0.91075
published_at 2026-04-01T12:55:00Z
1
value 0.06537
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-02T12:55:00Z
2
value 0.06537
scoring_system epss
scoring_elements 0.91089
published_at 2026-04-04T12:55:00Z
3
value 0.06537
scoring_system epss
scoring_elements 0.91098
published_at 2026-04-07T12:55:00Z
4
value 0.06537
scoring_system epss
scoring_elements 0.91111
published_at 2026-04-08T12:55:00Z
5
value 0.06537
scoring_system epss
scoring_elements 0.91116
published_at 2026-04-09T12:55:00Z
6
value 0.06537
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-13T12:55:00Z
7
value 0.06537
scoring_system epss
scoring_elements 0.91125
published_at 2026-04-12T12:55:00Z
8
value 0.06537
scoring_system epss
scoring_elements 0.91148
published_at 2026-04-18T12:55:00Z
9
value 0.06537
scoring_system epss
scoring_elements 0.91152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122
reference_id 649122
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=753799
reference_id 753799
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=753799
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1455
reference_id RHSA-2011:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1455
7
reference_url https://access.redhat.com/errata/RHSA-2012:0094
reference_id RHSA-2012:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0094
8
reference_url https://usn.ubuntu.com/1267-1/
reference_id USN-1267-1
reference_type
scores
url https://usn.ubuntu.com/1267-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2011-3439
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax
54
url VCID-wapu-grak-1bca
vulnerability_id VCID-wapu-grak-1bca
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
reference_id
reference_type
scores
0
value 0.05858
scoring_system epss
scoring_elements 0.90573
published_at 2026-04-21T12:55:00Z
1
value 0.05858
scoring_system epss
scoring_elements 0.90517
published_at 2026-04-01T12:55:00Z
2
value 0.05858
scoring_system epss
scoring_elements 0.90521
published_at 2026-04-02T12:55:00Z
3
value 0.05858
scoring_system epss
scoring_elements 0.90531
published_at 2026-04-04T12:55:00Z
4
value 0.05858
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-07T12:55:00Z
5
value 0.05858
scoring_system epss
scoring_elements 0.90549
published_at 2026-04-08T12:55:00Z
6
value 0.05858
scoring_system epss
scoring_elements 0.90556
published_at 2026-04-09T12:55:00Z
7
value 0.05858
scoring_system epss
scoring_elements 0.90564
published_at 2026-04-12T12:55:00Z
8
value 0.05858
scoring_system epss
scoring_elements 0.90558
published_at 2026-04-13T12:55:00Z
9
value 0.05858
scoring_system epss
scoring_elements 0.90575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800592
reference_id 800592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800592
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
reference_id CVE-2012-1134
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1134
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca
55
url VCID-wr9p-x4sm-aqdh
vulnerability_id VCID-wr9p-x4sm-aqdh
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.73951
published_at 2026-04-01T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74048
published_at 2026-04-18T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-08T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.74002
published_at 2026-04-09T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74024
published_at 2026-04-11T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74006
published_at 2026-04-12T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.73999
published_at 2026-04-13T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-21T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-02T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.73984
published_at 2026-04-04T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99091
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99091
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
reference_id 1446073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
reference_id 861308
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
reference_id CVE-2017-8287
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
20
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
21
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
22
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2017-8287
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh
56
url VCID-xb9q-dk8j-fbch
vulnerability_id VCID-xb9q-dk8j-fbch
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-02T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-04T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-07T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31584
published_at 2026-04-08T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31614
published_at 2026-04-09T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-11T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31576
published_at 2026-04-12T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-13T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-16T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31551
published_at 2026-04-18T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
reference_id 2077989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27404
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch
57
url VCID-xe45-fv7j-4ucr
vulnerability_id VCID-xe45-fv7j-4ucr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
reference_id
reference_type
scores
0
value 0.03091
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-21T12:55:00Z
1
value 0.03091
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-01T12:55:00Z
2
value 0.03091
scoring_system epss
scoring_elements 0.86738
published_at 2026-04-02T12:55:00Z
3
value 0.03091
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-04T12:55:00Z
4
value 0.03091
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-07T12:55:00Z
5
value 0.03091
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-08T12:55:00Z
6
value 0.03091
scoring_system epss
scoring_elements 0.86784
published_at 2026-04-09T12:55:00Z
7
value 0.03091
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-11T12:55:00Z
8
value 0.03091
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-12T12:55:00Z
9
value 0.03091
scoring_system epss
scoring_elements 0.8679
published_at 2026-04-13T12:55:00Z
10
value 0.03091
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-16T12:55:00Z
11
value 0.03091
scoring_system epss
scoring_elements 0.8681
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800581
reference_id 800581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800581
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
reference_id CVE-2012-1126
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1126
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr
58
url VCID-xyay-hhmw-cyb1
vulnerability_id VCID-xyay-hhmw-cyb1
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5668
reference_id
reference_type
scores
0
value 0.02815
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-21T12:55:00Z
1
value 0.02815
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-01T12:55:00Z
2
value 0.02815
scoring_system epss
scoring_elements 0.86087
published_at 2026-04-02T12:55:00Z
3
value 0.02815
scoring_system epss
scoring_elements 0.86104
published_at 2026-04-04T12:55:00Z
4
value 0.02815
scoring_system epss
scoring_elements 0.86103
published_at 2026-04-07T12:55:00Z
5
value 0.02815
scoring_system epss
scoring_elements 0.86122
published_at 2026-04-08T12:55:00Z
6
value 0.02815
scoring_system epss
scoring_elements 0.86133
published_at 2026-04-09T12:55:00Z
7
value 0.02815
scoring_system epss
scoring_elements 0.86148
published_at 2026-04-11T12:55:00Z
8
value 0.02815
scoring_system epss
scoring_elements 0.86146
published_at 2026-04-12T12:55:00Z
9
value 0.02815
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-13T12:55:00Z
10
value 0.02815
scoring_system epss
scoring_elements 0.8616
published_at 2026-04-16T12:55:00Z
11
value 0.02815
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5668
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
7
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
8
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
9
reference_url https://savannah.nongnu.org/bugs/?37905
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37905
10
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
11
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
12
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
13
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
14
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890087
reference_id 890087
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890087
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5668
reference_id CVE-2012-5668
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5668
65
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
66
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-5668
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1
59
url VCID-y4qf-qfbv-mqdg
vulnerability_id VCID-y4qf-qfbv-mqdg
summary freetype: NULL pointer dereference in the Ins_GETVARIATION() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41643
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41695
published_at 2026-04-13T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41742
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41717
published_at 2026-04-18T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.4916
published_at 2026-04-04T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49164
published_at 2026-04-09T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49181
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49098
published_at 2026-04-01T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49113
published_at 2026-04-07T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49131
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
reference_id 1544771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
reference_id 890450
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
5
reference_url https://security.archlinux.org/ASA-201805-3
reference_id ASA-201805-3
reference_type
scores
url https://security.archlinux.org/ASA-201805-3
6
reference_url https://security.archlinux.org/AVG-613
reference_id AVG-613
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-613
7
reference_url https://usn.ubuntu.com/3572-1/
reference_id USN-3572-1
reference_type
scores
url https://usn.ubuntu.com/3572-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
purl pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3
aliases CVE-2018-6942
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg
60
url VCID-ysfs-xxjz-vbep
vulnerability_id VCID-ysfs-xxjz-vbep
summary freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
reference_id
reference_type
scores
0
value 0.00798
scoring_system epss
scoring_elements 0.73965
published_at 2026-04-01T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74063
published_at 2026-04-18T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.74021
published_at 2026-04-12T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-13T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.74054
published_at 2026-04-21T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.73972
published_at 2026-04-02T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.73998
published_at 2026-04-04T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.73969
published_at 2026-04-07T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.74003
published_at 2026-04-08T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74017
published_at 2026-04-09T12:55:00Z
10
value 0.00798
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45922
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45922
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
reference_id 1763609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
reference_id CVE-2015-9382
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9382
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep
61
url VCID-zpnw-kwqf-63bp
vulnerability_id VCID-zpnw-kwqf-63bp
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-21T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.78063
published_at 2026-04-16T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-18T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-01T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-02T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-04T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-07T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78016
published_at 2026-04-08T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-09T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-11T12:55:00Z
10
value 0.01099
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-12T12:55:00Z
11
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
reference_id CVE-2014-9747
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9747
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp
62
url VCID-zu7v-a14h-2ueu
vulnerability_id VCID-zu7v-a14h-2ueu
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800594
reference_id 800594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800594
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
reference_id CVE-2012-1136
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
aliases CVE-2012-1136
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu
Fixing_vulnerabilities
0
url VCID-3vb1-m8xt-kfcf
vulnerability_id VCID-3vb1-m8xt-kfcf
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
2
reference_url http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
4
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
5
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
6
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
8
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
9
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3855
reference_id
reference_type
scores
0
value 0.04314
scoring_system epss
scoring_elements 0.88907
published_at 2026-04-21T12:55:00Z
1
value 0.04314
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-01T12:55:00Z
2
value 0.04314
scoring_system epss
scoring_elements 0.88852
published_at 2026-04-02T12:55:00Z
3
value 0.04314
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-04T12:55:00Z
4
value 0.04314
scoring_system epss
scoring_elements 0.88869
published_at 2026-04-07T12:55:00Z
5
value 0.04314
scoring_system epss
scoring_elements 0.88887
published_at 2026-04-08T12:55:00Z
6
value 0.04314
scoring_system epss
scoring_elements 0.88892
published_at 2026-04-09T12:55:00Z
7
value 0.04314
scoring_system epss
scoring_elements 0.88904
published_at 2026-04-11T12:55:00Z
8
value 0.04314
scoring_system epss
scoring_elements 0.88898
published_at 2026-04-13T12:55:00Z
9
value 0.04314
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-16T12:55:00Z
10
value 0.04314
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3855
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855
13
reference_url http://secunia.com/advisories/42289
reference_id
reference_type
scores
url http://secunia.com/advisories/42289
14
reference_url http://secunia.com/advisories/42295
reference_id
reference_type
scores
url http://secunia.com/advisories/42295
15
reference_url http://secunia.com/advisories/43138
reference_id
reference_type
scores
url http://secunia.com/advisories/43138
16
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
17
reference_url https://savannah.nongnu.org/bugs/?31310
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?31310
18
reference_url http://support.apple.com/kb/HT4564
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4564
19
reference_url http://support.apple.com/kb/HT4565
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4565
20
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
21
reference_url http://support.apple.com/kb/HT4802
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4802
22
reference_url http://support.apple.com/kb/HT4803
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4803
23
reference_url http://support.avaya.com/css/P8/documents/100122733
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100122733
24
reference_url http://www.debian.org/security/2011/dsa-2155
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2155
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
27
reference_url http://www.redhat.com/support/errata/RHSA-2010-0889.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0889.html
28
reference_url http://www.securityfocus.com/bid/44214
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44214
29
reference_url http://www.securitytracker.com/id?1024745
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024745
30
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
31
reference_url http://www.vupen.com/english/advisories/2010/3037
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3037
32
reference_url http://www.vupen.com/english/advisories/2011/0246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0246
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id 602221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645275
reference_id 645275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645275
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3855
reference_id CVE-2010-3855
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3855
68
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
69
reference_url https://access.redhat.com/errata/RHSA-2010:0889
reference_id RHSA-2010:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0889
70
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-3855
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf
1
url VCID-3xz8-4wu5-fugq
vulnerability_id VCID-3xz8-4wu5-fugq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30263
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30263
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613167
reference_id 613167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613167
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
reference_id CVE-2010-2500
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2500
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq
2
url VCID-48rk-qwp7-j7a8
vulnerability_id VCID-48rk-qwp7-j7a8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
reference_id
reference_type
scores
0
value 0.05194
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-21T12:55:00Z
1
value 0.05194
scoring_system epss
scoring_elements 0.89882
published_at 2026-04-01T12:55:00Z
2
value 0.05194
scoring_system epss
scoring_elements 0.89885
published_at 2026-04-02T12:55:00Z
3
value 0.05194
scoring_system epss
scoring_elements 0.89898
published_at 2026-04-04T12:55:00Z
4
value 0.05194
scoring_system epss
scoring_elements 0.89903
published_at 2026-04-07T12:55:00Z
5
value 0.05194
scoring_system epss
scoring_elements 0.89919
published_at 2026-04-08T12:55:00Z
6
value 0.05194
scoring_system epss
scoring_elements 0.89924
published_at 2026-04-09T12:55:00Z
7
value 0.05194
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-11T12:55:00Z
8
value 0.05194
scoring_system epss
scoring_elements 0.8993
published_at 2026-04-12T12:55:00Z
9
value 0.05194
scoring_system epss
scoring_elements 0.89923
published_at 2026-04-13T12:55:00Z
10
value 0.05194
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-16T12:55:00Z
11
value 0.05194
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://savannah.nongnu.org/bugs/?30657
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30657
15
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
16
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
17
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
18
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
19
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
20
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
21
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
22
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
23
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625627
reference_id 625627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625627
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
reference_id CVE-2010-2807
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
35
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
36
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2807
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8
3
url VCID-4wp3-qsuc-1kh9
vulnerability_id VCID-4wp3-qsuc-1kh9
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
reference_id
reference_type
scores
0
value 0.09383
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-21T12:55:00Z
1
value 0.09383
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-01T12:55:00Z
2
value 0.09383
scoring_system epss
scoring_elements 0.9276
published_at 2026-04-02T12:55:00Z
3
value 0.09383
scoring_system epss
scoring_elements 0.92765
published_at 2026-04-04T12:55:00Z
4
value 0.09383
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-07T12:55:00Z
5
value 0.09383
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-08T12:55:00Z
6
value 0.09383
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-09T12:55:00Z
7
value 0.09383
scoring_system epss
scoring_elements 0.92782
published_at 2026-04-11T12:55:00Z
8
value 0.09383
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-12T12:55:00Z
9
value 0.09383
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-13T12:55:00Z
10
value 0.09383
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30656
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30656
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621980
reference_id 621980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621980
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
reference_id CVE-2010-2806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
40
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
41
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
42
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2806
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9
4
url VCID-57th-r73p-a3fy
vulnerability_id VCID-57th-r73p-a3fy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
1
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
2
reference_url http://marc.info/?l=oss-security&m=127912955808467&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127912955808467&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
reference_id
reference_type
scores
0
value 0.02329
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-21T12:55:00Z
1
value 0.02329
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-01T12:55:00Z
2
value 0.02329
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-02T12:55:00Z
3
value 0.02329
scoring_system epss
scoring_elements 0.84786
published_at 2026-04-04T12:55:00Z
4
value 0.02329
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-07T12:55:00Z
5
value 0.02329
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-08T12:55:00Z
6
value 0.02329
scoring_system epss
scoring_elements 0.84817
published_at 2026-04-09T12:55:00Z
7
value 0.02329
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-11T12:55:00Z
8
value 0.02329
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-12T12:55:00Z
9
value 0.02329
scoring_system epss
scoring_elements 0.84827
published_at 2026-04-13T12:55:00Z
10
value 0.02329
scoring_system epss
scoring_elements 0.84848
published_at 2026-04-16T12:55:00Z
11
value 0.02329
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
5
reference_url http://savannah.nongnu.org/bugs/?30054
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/?30054
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
7
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
8
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
9
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
12
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=614557
reference_id 614557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=614557
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
reference_id CVE-2010-2527
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
22
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
23
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
24
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2527
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy
5
url VCID-64dt-nnzb-mkfc
vulnerability_id VCID-64dt-nnzb-mkfc
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3814
reference_id
reference_type
scores
0
value 0.05648
scoring_system epss
scoring_elements 0.9037
published_at 2026-04-21T12:55:00Z
1
value 0.05648
scoring_system epss
scoring_elements 0.90317
published_at 2026-04-01T12:55:00Z
2
value 0.05648
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-02T12:55:00Z
3
value 0.05648
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-04T12:55:00Z
4
value 0.05648
scoring_system epss
scoring_elements 0.90336
published_at 2026-04-07T12:55:00Z
5
value 0.05648
scoring_system epss
scoring_elements 0.90349
published_at 2026-04-08T12:55:00Z
6
value 0.05648
scoring_system epss
scoring_elements 0.90356
published_at 2026-04-09T12:55:00Z
7
value 0.05648
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-12T12:55:00Z
8
value 0.05648
scoring_system epss
scoring_elements 0.90357
published_at 2026-04-13T12:55:00Z
9
value 0.05648
scoring_system epss
scoring_elements 0.90373
published_at 2026-04-16T12:55:00Z
10
value 0.05648
scoring_system epss
scoring_elements 0.90372
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3814
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814
6
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
7
reference_url http://secunia.com/advisories/43138
reference_id
reference_type
scores
url http://secunia.com/advisories/43138
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://security-tracker.debian.org/tracker/CVE-2010-3814
reference_id
reference_type
scores
url http://security-tracker.debian.org/tracker/CVE-2010-3814
10
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
11
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
12
reference_url http://www.debian.org/security/2011/dsa-2155
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2155
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
14
reference_url http://www.securityfocus.com/bid/44643
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44643
15
reference_url http://www.securitytracker.com/id?1024767
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024767
16
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url http://www.vupen.com/english/advisories/2011/0246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0246
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id 602221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3814
reference_id CVE-2010-3814
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3814
54
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
55
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-3814
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc
6
url VCID-7698-fwj1-fufd
vulnerability_id VCID-7698-fwj1-fufd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
reference_id
reference_type
scores
0
value 0.03648
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-21T12:55:00Z
1
value 0.03648
scoring_system epss
scoring_elements 0.8788
published_at 2026-04-16T12:55:00Z
2
value 0.03648
scoring_system epss
scoring_elements 0.87879
published_at 2026-04-18T12:55:00Z
3
value 0.03648
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-02T12:55:00Z
4
value 0.03648
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-04T12:55:00Z
5
value 0.03648
scoring_system epss
scoring_elements 0.87835
published_at 2026-04-07T12:55:00Z
6
value 0.03648
scoring_system epss
scoring_elements 0.87856
published_at 2026-04-08T12:55:00Z
7
value 0.03648
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-09T12:55:00Z
8
value 0.03648
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-11T12:55:00Z
9
value 0.03648
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-12T12:55:00Z
10
value 0.03648
scoring_system epss
scoring_elements 0.87866
published_at 2026-04-13T12:55:00Z
11
value 0.04785
scoring_system epss
scoring_elements 0.89433
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
4
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
5
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
6
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
7
reference_url http://www.debian.org/security/2010/dsa-2116
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2116
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
10
reference_url http://www.securityfocus.com/bid/43700
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43700
11
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=623625
reference_id 623625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=623625
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
reference_id CVE-2010-3311
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
43
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
44
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
45
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
46
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
47
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-3311
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd
7
url VCID-ahxa-yjxp-a7en
vulnerability_id VCID-ahxa-yjxp-a7en
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
reference_id
reference_type
scores
0
value 0.03379
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-21T12:55:00Z
1
value 0.03379
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-01T12:55:00Z
2
value 0.03379
scoring_system epss
scoring_elements 0.8734
published_at 2026-04-02T12:55:00Z
3
value 0.03379
scoring_system epss
scoring_elements 0.87355
published_at 2026-04-04T12:55:00Z
4
value 0.03379
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-07T12:55:00Z
5
value 0.03379
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-08T12:55:00Z
6
value 0.03379
scoring_system epss
scoring_elements 0.87381
published_at 2026-04-09T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-11T12:55:00Z
8
value 0.03379
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-12T12:55:00Z
9
value 0.03379
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-13T12:55:00Z
10
value 0.03379
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-16T12:55:00Z
11
value 0.03379
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30248
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30248
12
reference_url https://savannah.nongnu.org/bugs/?30249
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30249
13
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
14
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
17
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613162
reference_id 613162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613162
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
reference_id CVE-2010-2499
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
28
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2499
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en
8
url VCID-bt31-xk8r-8qd2
vulnerability_id VCID-bt31-xk8r-8qd2
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
reference_id
reference_type
scores
0
value 0.02089
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-21T12:55:00Z
1
value 0.02089
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-01T12:55:00Z
2
value 0.02089
scoring_system epss
scoring_elements 0.83968
published_at 2026-04-02T12:55:00Z
3
value 0.02089
scoring_system epss
scoring_elements 0.83983
published_at 2026-04-04T12:55:00Z
4
value 0.02089
scoring_system epss
scoring_elements 0.83987
published_at 2026-04-07T12:55:00Z
5
value 0.02089
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-08T12:55:00Z
6
value 0.02089
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-09T12:55:00Z
7
value 0.02089
scoring_system epss
scoring_elements 0.84033
published_at 2026-04-11T12:55:00Z
8
value 0.02089
scoring_system epss
scoring_elements 0.84026
published_at 2026-04-12T12:55:00Z
9
value 0.02089
scoring_system epss
scoring_elements 0.84022
published_at 2026-04-13T12:55:00Z
10
value 0.02089
scoring_system epss
scoring_elements 0.84046
published_at 2026-04-16T12:55:00Z
11
value 0.02089
scoring_system epss
scoring_elements 0.84047
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30082
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30082
10
reference_url https://savannah.nongnu.org/bugs/?30083
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30083
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613154
reference_id 613154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613154
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
reference_id CVE-2010-2497
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
19
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2497
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2
9
url VCID-cwfg-1d6f-hfgg
vulnerability_id VCID-cwfg-1d6f-hfgg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128110167119337&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128110167119337&w=2
5
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
reference_id
reference_type
scores
0
value 0.07802
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-21T12:55:00Z
1
value 0.07802
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-01T12:55:00Z
2
value 0.07802
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-02T12:55:00Z
3
value 0.07802
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-04T12:55:00Z
4
value 0.07802
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-07T12:55:00Z
5
value 0.07802
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-08T12:55:00Z
6
value 0.07802
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-09T12:55:00Z
7
value 0.07802
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-11T12:55:00Z
8
value 0.07802
scoring_system epss
scoring_elements 0.91979
published_at 2026-04-12T12:55:00Z
9
value 0.07802
scoring_system epss
scoring_elements 0.91976
published_at 2026-04-13T12:55:00Z
10
value 0.07802
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-16T12:55:00Z
11
value 0.07802
scoring_system epss
scoring_elements 0.91993
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
10
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
11
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
12
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
13
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30658
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30658
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621907
reference_id 621907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621907
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
reference_id CVE-2010-2808
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
40
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
41
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2808
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg
10
url VCID-f9ym-em5n-87ep
vulnerability_id VCID-f9ym-em5n-87ep
summary
Multiple integer overflows in FreeType might allow for the remote execution
    of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
reference_id
reference_type
scores
0
value 0.16376
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-01T12:55:00Z
1
value 0.16376
scoring_system epss
scoring_elements 0.94836
published_at 2026-04-02T12:55:00Z
2
value 0.16376
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-04T12:55:00Z
3
value 0.16376
scoring_system epss
scoring_elements 0.94842
published_at 2026-04-07T12:55:00Z
4
value 0.16376
scoring_system epss
scoring_elements 0.94851
published_at 2026-04-08T12:55:00Z
5
value 0.16376
scoring_system epss
scoring_elements 0.94856
published_at 2026-04-09T12:55:00Z
6
value 0.16376
scoring_system epss
scoring_elements 0.9486
published_at 2026-04-11T12:55:00Z
7
value 0.16376
scoring_system epss
scoring_elements 0.94863
published_at 2026-04-12T12:55:00Z
8
value 0.16376
scoring_system epss
scoring_elements 0.94864
published_at 2026-04-13T12:55:00Z
9
value 0.16376
scoring_system epss
scoring_elements 0.94872
published_at 2026-04-16T12:55:00Z
10
value 0.16376
scoring_system epss
scoring_elements 0.94875
published_at 2026-04-18T12:55:00Z
11
value 0.16376
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491384
reference_id 491384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491384
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
reference_id 524925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
5
reference_url https://security.gentoo.org/glsa/200905-05
reference_id GLSA-200905-05
reference_type
scores
url https://security.gentoo.org/glsa/200905-05
6
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
7
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
8
reference_url https://access.redhat.com/errata/RHSA-2009:1061
reference_id RHSA-2009:1061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1061
9
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
10
reference_url https://usn.ubuntu.com/767-1/
reference_id USN-767-1
reference_type
scores
url https://usn.ubuntu.com/767-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2009-0946
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep
11
url VCID-gcht-dzky-fbay
vulnerability_id VCID-gcht-dzky-fbay
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
reference_id
reference_type
scores
0
value 0.03893
scoring_system epss
scoring_elements 0.88275
published_at 2026-04-21T12:55:00Z
1
value 0.03893
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-01T12:55:00Z
2
value 0.03893
scoring_system epss
scoring_elements 0.88214
published_at 2026-04-02T12:55:00Z
3
value 0.03893
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-04T12:55:00Z
4
value 0.03893
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-07T12:55:00Z
5
value 0.03893
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-08T12:55:00Z
6
value 0.03893
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-09T12:55:00Z
7
value 0.03893
scoring_system epss
scoring_elements 0.88272
published_at 2026-04-11T12:55:00Z
8
value 0.03893
scoring_system epss
scoring_elements 0.88264
published_at 2026-04-12T12:55:00Z
9
value 0.03893
scoring_system epss
scoring_elements 0.88263
published_at 2026-04-13T12:55:00Z
10
value 0.03893
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-16T12:55:00Z
11
value 0.03893
scoring_system epss
scoring_elements 0.88276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
11
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
14
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
15
reference_url http://www.securityfocus.com/bid/42621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42621
16
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625632
reference_id 625632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625632
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
reference_id CVE-2010-3054
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
28
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-3054
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay
12
url VCID-gmk4-9sks-s3a5
vulnerability_id VCID-gmk4-9sks-s3a5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
reference_id
reference_type
scores
0
value 0.04292
scoring_system epss
scoring_elements 0.88809
published_at 2026-04-01T12:55:00Z
1
value 0.04292
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-04T12:55:00Z
2
value 0.04292
scoring_system epss
scoring_elements 0.88837
published_at 2026-04-07T12:55:00Z
3
value 0.04292
scoring_system epss
scoring_elements 0.88854
published_at 2026-04-08T12:55:00Z
4
value 0.04292
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-09T12:55:00Z
5
value 0.04292
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-11T12:55:00Z
6
value 0.04292
scoring_system epss
scoring_elements 0.88818
published_at 2026-04-02T12:55:00Z
7
value 0.04622
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-18T12:55:00Z
8
value 0.04622
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-21T12:55:00Z
9
value 0.04622
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-12T12:55:00Z
10
value 0.04622
scoring_system epss
scoring_elements 0.89269
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
3
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
5
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
6
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
7
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
8
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
11
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
12
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617342
reference_id 617342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617342
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
reference_id CVE-2010-2541
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
21
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
22
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
23
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
24
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2541
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5
13
url VCID-pzsb-3h3d-t7hq
vulnerability_id VCID-pzsb-3h3d-t7hq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30106
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30106
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
15
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613160
reference_id 613160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613160
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
reference_id CVE-2010-2498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
28
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2498
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq
14
url VCID-tyhk-9jvd-y7bj
vulnerability_id VCID-tyhk-9jvd-y7bj
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
reference_id
reference_type
scores
0
value 0.03154
scoring_system epss
scoring_elements 0.86924
published_at 2026-04-21T12:55:00Z
1
value 0.03154
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-01T12:55:00Z
2
value 0.03154
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-02T12:55:00Z
3
value 0.03154
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-04T12:55:00Z
4
value 0.03154
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-07T12:55:00Z
5
value 0.03154
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-08T12:55:00Z
6
value 0.03154
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-09T12:55:00Z
7
value 0.03154
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-11T12:55:00Z
8
value 0.03154
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-12T12:55:00Z
9
value 0.03154
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-13T12:55:00Z
10
value 0.03154
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30361
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30361
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
13
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613198
reference_id 613198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613198
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
reference_id CVE-2010-2520
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
24
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2520
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj
15
url VCID-vykx-mb8e-hyfv
vulnerability_id VCID-vykx-mb8e-hyfv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
2
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
3
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
4
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
5
reference_url http://osvdb.org/66828
reference_id
reference_type
scores
url http://osvdb.org/66828
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
reference_id
reference_type
scores
0
value 0.5972
scoring_system epss
scoring_elements 0.98264
published_at 2026-04-18T12:55:00Z
1
value 0.5972
scoring_system epss
scoring_elements 0.98242
published_at 2026-04-01T12:55:00Z
2
value 0.5972
scoring_system epss
scoring_elements 0.98245
published_at 2026-04-02T12:55:00Z
3
value 0.5972
scoring_system epss
scoring_elements 0.98248
published_at 2026-04-07T12:55:00Z
4
value 0.5972
scoring_system epss
scoring_elements 0.98253
published_at 2026-04-08T12:55:00Z
5
value 0.5972
scoring_system epss
scoring_elements 0.98254
published_at 2026-04-09T12:55:00Z
6
value 0.5972
scoring_system epss
scoring_elements 0.98257
published_at 2026-04-13T12:55:00Z
7
value 0.5972
scoring_system epss
scoring_elements 0.98263
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
10
reference_url http://secunia.com/advisories/40807
reference_id
reference_type
scores
url http://secunia.com/advisories/40807
11
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
12
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
15
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
16
reference_url http://support.apple.com/kb/HT4291
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4291
17
reference_url http://support.apple.com/kb/HT4292
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4292
18
reference_url http://www.exploit-db.com/exploits/14538
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/14538
19
reference_url http://www.f-secure.com/weblog/archives/00002002.html
reference_id
reference_type
scores
url http://www.f-secure.com/weblog/archives/00002002.html
20
reference_url http://www.securityfocus.com/bid/42151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42151
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621144
reference_id 621144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621144
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
reference_id CVE-2010-1797
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
reference_id CVE-2010-1797;OSVDB-66828
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
92
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
reference_id CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
93
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
94
reference_url https://access.redhat.com/errata/RHSA-2010:0607
reference_id RHSA-2010:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0607
95
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-1797
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv
16
url VCID-wbve-vpw4-tqhe
vulnerability_id VCID-wbve-vpw4-tqhe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
reference_id
reference_type
scores
0
value 0.0452
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-21T12:55:00Z
1
value 0.0452
scoring_system epss
scoring_elements 0.89105
published_at 2026-04-01T12:55:00Z
2
value 0.0452
scoring_system epss
scoring_elements 0.89114
published_at 2026-04-02T12:55:00Z
3
value 0.0452
scoring_system epss
scoring_elements 0.89128
published_at 2026-04-04T12:55:00Z
4
value 0.0452
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-07T12:55:00Z
5
value 0.0452
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-08T12:55:00Z
6
value 0.0452
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-09T12:55:00Z
7
value 0.0452
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-11T12:55:00Z
8
value 0.0452
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-12T12:55:00Z
9
value 0.0452
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-13T12:55:00Z
10
value 0.0452
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30306
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30306
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613194
reference_id 613194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613194
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
reference_id CVE-2010-2519
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
29
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2519
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe
17
url VCID-yq1k-j2t6-e7g5
vulnerability_id VCID-yq1k-j2t6-e7g5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
reference_id
reference_type
scores
0
value 0.01701
scoring_system epss
scoring_elements 0.82332
published_at 2026-04-21T12:55:00Z
1
value 0.01701
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-01T12:55:00Z
2
value 0.01701
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-02T12:55:00Z
3
value 0.01701
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-04T12:55:00Z
4
value 0.01701
scoring_system epss
scoring_elements 0.82254
published_at 2026-04-07T12:55:00Z
5
value 0.01701
scoring_system epss
scoring_elements 0.8228
published_at 2026-04-08T12:55:00Z
6
value 0.01701
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-09T12:55:00Z
7
value 0.01701
scoring_system epss
scoring_elements 0.82308
published_at 2026-04-11T12:55:00Z
8
value 0.01701
scoring_system epss
scoring_elements 0.82301
published_at 2026-04-12T12:55:00Z
9
value 0.01701
scoring_system epss
scoring_elements 0.82295
published_at 2026-04-13T12:55:00Z
10
value 0.01701
scoring_system epss
scoring_elements 0.8233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
12
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
13
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
14
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625630
reference_id 625630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625630
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
reference_id CVE-2010-3053
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
47
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-3053
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5
18
url VCID-zn5p-qvxr-fqhx
vulnerability_id VCID-zn5p-qvxr-fqhx
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
reference_id
reference_type
scores
0
value 0.05634
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-21T12:55:00Z
1
value 0.05634
scoring_system epss
scoring_elements 0.90305
published_at 2026-04-01T12:55:00Z
2
value 0.05634
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-02T12:55:00Z
3
value 0.05634
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-04T12:55:00Z
4
value 0.05634
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-07T12:55:00Z
5
value 0.05634
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-08T12:55:00Z
6
value 0.05634
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-09T12:55:00Z
7
value 0.05634
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-11T12:55:00Z
8
value 0.05634
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-12T12:55:00Z
9
value 0.05634
scoring_system epss
scoring_elements 0.90347
published_at 2026-04-13T12:55:00Z
10
value 0.05634
scoring_system epss
scoring_elements 0.90363
published_at 2026-04-16T12:55:00Z
11
value 0.05634
scoring_system epss
scoring_elements 0.90362
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://savannah.nongnu.org/bugs/?30644
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30644
16
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
17
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
18
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
20
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
25
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625626
reference_id 625626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625626
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
reference_id CVE-2010-2805
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
37
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
38
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
39
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
purl pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1teu-tz69-dff8
2
vulnerability VCID-1ws8-ww77-ybah
3
vulnerability VCID-2fsn-uxp3-fbeg
4
vulnerability VCID-38u1-6t8n-gqey
5
vulnerability VCID-3jn7-t1f6-uyfr
6
vulnerability VCID-468g-dxsr-8yer
7
vulnerability VCID-5rpx-8t3t-syhv
8
vulnerability VCID-613j-8z2t-t3au
9
vulnerability VCID-6pzj-1sgf-zbbr
10
vulnerability VCID-6xf8-49hw-hfaf
11
vulnerability VCID-6z8y-k8vw-nudd
12
vulnerability VCID-73d5-ezt5-87eh
13
vulnerability VCID-73e1-scax-8ugj
14
vulnerability VCID-79js-ywyp-x3au
15
vulnerability VCID-a9r6-k8gp-nbfs
16
vulnerability VCID-ask2-xeb7-7qbk
17
vulnerability VCID-b35u-t7u2-sudy
18
vulnerability VCID-d2v4-gm58-uyby
19
vulnerability VCID-dcxj-zzfj-3bg7
20
vulnerability VCID-edag-8pt8-jqdw
21
vulnerability VCID-ettc-tamy-kfcf
22
vulnerability VCID-ewj8-a9c8-w3dy
23
vulnerability VCID-fp2p-5ymf-wffj
24
vulnerability VCID-gcr7-xxtw-e3bs
25
vulnerability VCID-gtka-sbgw-tuf5
26
vulnerability VCID-h7qy-dusf-tqb7
27
vulnerability VCID-hgkz-p83z-ybfe
28
vulnerability VCID-hutw-rk7x-5bc3
29
vulnerability VCID-jg4p-nv1j-fyb9
30
vulnerability VCID-jn9w-2axj-8ke5
31
vulnerability VCID-jwbe-5wmu-uqgp
32
vulnerability VCID-m8ha-zxb7-tyg6
33
vulnerability VCID-mv93-73qb-ekgt
34
vulnerability VCID-n99m-fgj7-y3bk
35
vulnerability VCID-nakp-vmxa-akey
36
vulnerability VCID-nfp7-sjcv-wkfv
37
vulnerability VCID-nn4w-gq71-kfgd
38
vulnerability VCID-nx21-ks3v-53e4
39
vulnerability VCID-p2yw-ksc4-jfe9
40
vulnerability VCID-p8h9-9xku-hbhv
41
vulnerability VCID-pznp-81q7-z3d4
42
vulnerability VCID-qu13-pxwm-d3da
43
vulnerability VCID-s148-7tzs-gfg8
44
vulnerability VCID-s9u5-4nwv-vudq
45
vulnerability VCID-th47-m45d-m7dk
46
vulnerability VCID-tmb5-g2ua-ekek
47
vulnerability VCID-tsw4-kqbc-kqf1
48
vulnerability VCID-tu7r-tsp8-73ew
49
vulnerability VCID-u15r-u7zz-17ad
50
vulnerability VCID-uh3u-pzzg-fkgg
51
vulnerability VCID-uhnk-v91u-p7e5
52
vulnerability VCID-uy24-k7je-pyhr
53
vulnerability VCID-v6um-wgpt-myax
54
vulnerability VCID-wapu-grak-1bca
55
vulnerability VCID-wr9p-x4sm-aqdh
56
vulnerability VCID-xb9q-dk8j-fbch
57
vulnerability VCID-xe45-fv7j-4ucr
58
vulnerability VCID-xyay-hhmw-cyb1
59
vulnerability VCID-y4qf-qfbv-mqdg
60
vulnerability VCID-ysfs-xxjz-vbep
61
vulnerability VCID-zpnw-kwqf-63bp
62
vulnerability VCID-zu7v-a14h-2ueu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4
aliases CVE-2010-2805
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4