Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571392?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "type": "deb", "namespace": "debian", "name": "freetype", "version": "2.4.9-1.1+deb7u3", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "latest_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38514?format=api", "vulnerability_id": "VCID-17au-pc1k-m7at", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90103", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.90163", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05416", "scoring_system": "epss", "scoring_elements": "0.9016", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084", "reference_id": "1191084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9662" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=api", "vulnerability_id": "VCID-1ws8-ww77-ybah", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.8986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89864", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89871", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89865", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190", "reference_id": "1191190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9674" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=api", "vulnerability_id": "VCID-3jn7-t1f6-uyfr", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079", "reference_id": "1191079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9657" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37481?format=api", "vulnerability_id": "VCID-468g-dxsr-8yer", "summary": "A vulnerability in FreeType could result in execution of arbitrary\n code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.8304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83078", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83116", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01867", "scoring_system": "epss", "scoring_elements": "0.83119", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646", "reference_id": "1074646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299", "reference_id": "741299", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299" }, { "reference_url": "https://security.gentoo.org/glsa/201408-02", "reference_id": "GLSA-201408-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201408-02" }, { "reference_url": "https://usn.ubuntu.com/2148-1/", "reference_id": "USN-2148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2148-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-2240" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=api", "vulnerability_id": "VCID-6xf8-49hw-hfaf", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66561", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66589", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965", "reference_id": "1429965", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971", "reference_id": "856971", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3237-1/", "reference_id": "USN-3237-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3237-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2016-10244" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=api", "vulnerability_id": "VCID-73d5-ezt5-87eh", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.8563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85654", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085", "reference_id": "1191085", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9663" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=api", "vulnerability_id": "VCID-73e1-scax-8ugj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84142", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84146", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192", "reference_id": "1191192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9675" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=api", "vulnerability_id": "VCID-a9r6-k8gp-nbfs", "summary": "freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85974", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.8598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85944", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85966", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?46346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?46346" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613", "reference_id": "1763613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383", "reference_id": "CVE-2015-9383", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383" }, { "reference_url": "https://usn.ubuntu.com/4126-1/", "reference_id": "USN-4126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-1/" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9383" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=api", "vulnerability_id": "VCID-ask2-xeb7-7qbk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.86989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.8704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87062", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094", "reference_id": "1191094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9671" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=api", "vulnerability_id": "VCID-b35u-t7u2-sudy", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74761", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.7472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74727", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746", "reference_id": "CVE-2014-9746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=api", "vulnerability_id": "VCID-dcxj-zzfj-3bg7", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35819", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985", "reference_id": "2077985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5453-1/", "reference_id": "USN-5453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5453-1/" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27406" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=api", "vulnerability_id": "VCID-fp2p-5ymf-wffj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85204", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85205", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092", "reference_id": "1191092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9669" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38523?format=api", "vulnerability_id": "VCID-gtka-sbgw-tuf5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88852", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.8886", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88896", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88921", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04321", "scoring_system": "epss", "scoring_elements": "0.88915", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087", "reference_id": "1191087", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9665" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=api", "vulnerability_id": "VCID-hutw-rk7x-5bc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86373", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377", "reference_id": "1262377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620", "reference_id": "798620", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620" }, { "reference_url": "https://usn.ubuntu.com/2739-1/", "reference_id": "USN-2739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9745" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=api", "vulnerability_id": "VCID-jg4p-nv1j-fyb9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.8977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.8978", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093", "reference_id": "1191093", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9670" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38501?format=api", "vulnerability_id": "VCID-jn9w-2axj-8ke5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86208", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86241", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.8626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.8628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02866", "scoring_system": "epss", "scoring_elements": "0.86273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081", "reference_id": "1191081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084", "reference_id": "773084", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9659" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=api", "vulnerability_id": "VCID-m8ha-zxb7-tyg6", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81834", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.8176", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99093" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500", "reference_id": "1446500", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220", "reference_id": "861220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105", "reference_id": "CVE-2017-8105", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8105" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=api", "vulnerability_id": "VCID-nakp-vmxa-akey", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78478", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78504", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78537", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78533", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086", "reference_id": "1191086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9664" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38533?format=api", "vulnerability_id": "VCID-nfp7-sjcv-wkfv", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82336", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.8235", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82391", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82399", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82414", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82409", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82445", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01723", "scoring_system": "epss", "scoring_elements": "0.82449", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091", "reference_id": "1191091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9668" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=api", "vulnerability_id": "VCID-nn4w-gq71-kfgd", "summary": "freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66011", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65999", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802", "reference_id": "1741802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9290" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=api", "vulnerability_id": "VCID-nx21-ks3v-53e4", "summary": "Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99773", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99773", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999" }, { "reference_url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html" }, { "reference_url": "https://crbug.com/1139963", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://crbug.com/1139963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" }, { "reference_url": "http://seclists.org/fulldisclosure/2020/Nov/33", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://seclists.org/fulldisclosure/2020/Nov/33" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/cefsharp/CefSharp", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp" }, { "reference_url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999" }, { "reference_url": "https://security.gentoo.org/glsa/202011-12", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202011-12" }, { "reference_url": "https://security.gentoo.org/glsa/202012-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202012-04" }, { "reference_url": "https://security.gentoo.org/glsa/202401-19", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202401-19" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240812-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240812-0001" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4824", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Common", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Common" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.WinForms", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.WinForms" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210", "reference_id": "1890210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586", "reference_id": "972586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586" }, { "reference_url": "https://security.archlinux.org/ASA-202010-10", "reference_id": "ASA-202010-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-10" }, { "reference_url": "https://security.archlinux.org/ASA-202010-11", "reference_id": "ASA-202010-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-11" }, { "reference_url": "https://security.archlinux.org/ASA-202011-12", "reference_id": "ASA-202011-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-12" }, { "reference_url": "https://security.archlinux.org/AVG-1254", "reference_id": "AVG-1254", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1254" }, { "reference_url": "https://security.archlinux.org/AVG-1255", "reference_id": "AVG-1255", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1255" }, { "reference_url": "https://security.archlinux.org/AVG-1279", "reference_id": "AVG-1279", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1279" }, { "reference_url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "GHSA-pv36-h7jh-qm62", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://security.gentoo.org/glsa/202010-07", "reference_id": "GLSA-202010-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/", "reference_id": "J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50", "reference_id": "mfsa2020-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51", "reference_id": "mfsa2020-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52", "reference_id": "mfsa2020-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4351", "reference_id": "RHSA-2020:4351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4907", "reference_id": "RHSA-2020:4907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4949", "reference_id": "RHSA-2020:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4950", "reference_id": "RHSA-2020:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4951", "reference_id": "RHSA-2020:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4952", "reference_id": "RHSA-2020:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4952" }, { "reference_url": "https://usn.ubuntu.com/4593-1/", "reference_id": "USN-4593-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-1/" }, { "reference_url": "https://usn.ubuntu.com/4593-2/", "reference_id": "USN-4593-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2020-15999", "GHSA-pv36-h7jh-qm62" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=api", "vulnerability_id": "VCID-p2yw-ksc4-jfe9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89552", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082", "reference_id": "1191082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9660" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=api", "vulnerability_id": "VCID-p8h9-9xku-hbhv", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80537", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80624", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80628", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089", "reference_id": "1191089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9666" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=api", "vulnerability_id": "VCID-pznp-81q7-z3d4", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080", "reference_id": "1191080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9658" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=api", "vulnerability_id": "VCID-s148-7tzs-gfg8", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25872", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2577", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25743", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991", "reference_id": "2077991", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27405" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=api", "vulnerability_id": "VCID-th47-m45d-m7dk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83827", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090", "reference_id": "1191090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9667" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86356?format=api", "vulnerability_id": "VCID-tmb5-g2ua-ekek", "summary": "freetype: OOB stack-based read/write in cf2_hintmap_build()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.6992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.6997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.7", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.7001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00618", "scoring_system": "epss", "scoring_elements": "0.69992", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646", "reference_id": "1074646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299", "reference_id": "741299", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299" }, { "reference_url": "https://usn.ubuntu.com/2148-1/", "reference_id": "USN-2148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2148-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-2241" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=api", "vulnerability_id": "VCID-tsw4-kqbc-kqf1", "summary": "freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72282", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72294", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72225", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72256", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45955" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788", "reference_id": "1752788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381", "reference_id": "CVE-2015-9381", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9381" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=api", "vulnerability_id": "VCID-tu7r-tsp8-73ew", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88751", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88772", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096", "reference_id": "1191096", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9673" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=api", "vulnerability_id": "VCID-u15r-u7zz-17ad", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89376", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095", "reference_id": "1191095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9672" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=api", "vulnerability_id": "VCID-uh3u-pzzg-fkgg", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89613", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89659", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083", "reference_id": "1191083", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9661" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=api", "vulnerability_id": "VCID-uhnk-v91u-p7e5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8527", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85271", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078", "reference_id": "1191078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9656" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=api", "vulnerability_id": "VCID-uy24-k7je-pyhr", "summary": "A vulnerability has been discovered in FreeType, which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98415", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98462", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.68721", "scoring_system": "epss", "scoring_elements": "0.98627", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357", "reference_id": "2351357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357" }, { "reference_url": "https://security.archlinux.org/ASA-202505-11", "reference_id": "ASA-202505-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202505-11" }, { "reference_url": "https://security.archlinux.org/AVG-2877", "reference_id": "AVG-2877", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2877" }, { "reference_url": "https://www.facebook.com/security/advisories/cve-2025-27363", "reference_id": "cve-2025-27363", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/" } ], "url": "https://www.facebook.com/security/advisories/cve-2025-27363" }, { "reference_url": "https://security.gentoo.org/glsa/202505-07", "reference_id": "GLSA-202505-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3382", "reference_id": "RHSA-2025:3382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3383", "reference_id": "RHSA-2025:3383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3384", "reference_id": "RHSA-2025:3384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3385", "reference_id": "RHSA-2025:3385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3386", "reference_id": "RHSA-2025:3386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3387", "reference_id": "RHSA-2025:3387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3393", "reference_id": "RHSA-2025:3393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3395", "reference_id": "RHSA-2025:3395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3407", "reference_id": "RHSA-2025:3407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3421", "reference_id": "RHSA-2025:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8195", "reference_id": "RHSA-2025:8195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8219", "reference_id": "RHSA-2025:8219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8253", "reference_id": "RHSA-2025:8253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8292", "reference_id": "RHSA-2025:8292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9380", "reference_id": "RHSA-2025:9380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9380" }, { "reference_url": "https://usn.ubuntu.com/7352-1/", "reference_id": "USN-7352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1056064?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4" } ], "aliases": [ "CVE-2025-27363" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=api", "vulnerability_id": "VCID-wr9p-x4sm-aqdh", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73951", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74048", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73955", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99091", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99091" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073", "reference_id": "1446073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308", "reference_id": "861308", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287", "reference_id": "CVE-2017-8287", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8287" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=api", "vulnerability_id": "VCID-xb9q-dk8j-fbch", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31668", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989", "reference_id": "2077989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27404" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=api", "vulnerability_id": "VCID-y4qf-qfbv-mqdg", "summary": "freetype: NULL pointer dereference in the Ins_GETVARIATION() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41643", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.4916", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49181", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49131", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771", "reference_id": "1544771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450", "reference_id": "890450", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450" }, { "reference_url": "https://security.archlinux.org/ASA-201805-3", "reference_id": "ASA-201805-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-3" }, { "reference_url": "https://security.archlinux.org/AVG-613", "reference_id": "AVG-613", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-613" }, { "reference_url": "https://usn.ubuntu.com/3572-1/", "reference_id": "USN-3572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3572-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" } ], "aliases": [ "CVE-2018-6942" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=api", "vulnerability_id": "VCID-ysfs-xxjz-vbep", "summary": "freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74063", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74054", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74003", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45922" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609", "reference_id": "1763609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382", "reference_id": "CVE-2015-9382", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9382" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=api", "vulnerability_id": "VCID-zpnw-kwqf-63bp", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78055", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78062", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78016", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78028", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747", "reference_id": "CVE-2014-9747", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9747" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=api", "vulnerability_id": "VCID-1teu-tz69-dff8", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85879", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85892", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85897", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584", "reference_id": "800584", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128", "reference_id": "CVE-2012-1128", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1128" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=api", "vulnerability_id": "VCID-1ws8-ww77-ybah", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.8986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89864", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89871", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05124", "scoring_system": "epss", "scoring_elements": "0.89865", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190", "reference_id": "1191190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9674" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=api", "vulnerability_id": "VCID-2fsn-uxp3-fbeg", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587", "reference_id": "800587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130", "reference_id": "CVE-2012-1130", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1130" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=api", "vulnerability_id": "VCID-38u1-6t8n-gqey", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84261", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84196", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84233", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84256", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606", "reference_id": "800606", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143", "reference_id": "CVE-2012-1143", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1143" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=api", "vulnerability_id": "VCID-3jn7-t1f6-uyfr", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079", "reference_id": "1191079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9657" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=api", "vulnerability_id": "VCID-5rpx-8t3t-syhv", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598", "reference_id": "800598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139", "reference_id": "CVE-2012-1139", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1139" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=api", "vulnerability_id": "VCID-613j-8z2t-t3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585", "reference_id": "800585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129", "reference_id": "CVE-2012-1129", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1129" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=api", "vulnerability_id": "VCID-6pzj-1sgf-zbbr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607", "reference_id": "800607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144", "reference_id": "CVE-2012-1144", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1144" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=api", "vulnerability_id": "VCID-6z8y-k8vw-nudd", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604", "reference_id": "800604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142", "reference_id": "CVE-2012-1142", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1142" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=api", "vulnerability_id": "VCID-73d5-ezt5-87eh", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85558", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85637", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.8563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85653", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85658", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02607", "scoring_system": "epss", "scoring_elements": "0.85654", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085", "reference_id": "1191085", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9663" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=api", "vulnerability_id": "VCID-73e1-scax-8ugj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.8408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84105", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84129", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84119", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84141", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84142", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02114", "scoring_system": "epss", "scoring_elements": "0.84146", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192", "reference_id": "1191192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9675" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35802?format=api", "vulnerability_id": "VCID-79js-ywyp-x3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93274", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93334", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871", "reference_id": "635871", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701", "reference_id": "722701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1085", "reference_id": "RHSA-2011:1085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1085" }, { "reference_url": "https://usn.ubuntu.com/1173-1/", "reference_id": "USN-1173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1173-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-0226" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=api", "vulnerability_id": "VCID-ask2-xeb7-7qbk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.86989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.8704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03218", "scoring_system": "epss", "scoring_elements": "0.87062", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094", "reference_id": "1191094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9671" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=api", "vulnerability_id": "VCID-b35u-t7u2-sudy", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74761", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.7472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74727", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746", "reference_id": "CVE-2014-9746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=api", "vulnerability_id": "VCID-d2v4-gm58-uyby", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600", "reference_id": "800600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140", "reference_id": "CVE-2012-1140", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1140" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=api", "vulnerability_id": "VCID-edag-8pt8-jqdw", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595", "reference_id": "800595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137", "reference_id": "CVE-2012-1137", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1137" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=api", "vulnerability_id": "VCID-ettc-tamy-kfcf", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591", "reference_id": "800591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133", "reference_id": "CVE-2012-1133", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=api", "vulnerability_id": "VCID-ewj8-a9c8-w3dy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593", "reference_id": "800593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135", "reference_id": "CVE-2012-1135", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1135" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=api", "vulnerability_id": "VCID-fp2p-5ymf-wffj", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.8514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85204", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02443", "scoring_system": "epss", "scoring_elements": "0.85205", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092", "reference_id": "1191092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9669" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35803?format=api", "vulnerability_id": "VCID-gcr7-xxtw-e3bs", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.8533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85331", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87114", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87118", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120", "reference_id": "646120", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226", "reference_id": "746226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1402", "reference_id": "RHSA-2011:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-3256" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=api", "vulnerability_id": "VCID-h7qy-dusf-tqb7", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602", "reference_id": "800602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141", "reference_id": "CVE-2012-1141", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1141" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=api", "vulnerability_id": "VCID-hgkz-p83z-ybfe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583", "reference_id": "800583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127", "reference_id": "CVE-2012-1127", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1127" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=api", "vulnerability_id": "VCID-hutw-rk7x-5bc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86373", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377", "reference_id": "1262377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620", "reference_id": "798620", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620" }, { "reference_url": "https://usn.ubuntu.com/2739-1/", "reference_id": "USN-2739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9745" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=api", "vulnerability_id": "VCID-jg4p-nv1j-fyb9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89746", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89748", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89772", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89778", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.8977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05048", "scoring_system": "epss", "scoring_elements": "0.8978", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093", "reference_id": "1191093", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9670" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=api", "vulnerability_id": "VCID-jwbe-5wmu-uqgp", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589", "reference_id": "800589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131", "reference_id": "CVE-2012-1131", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1131" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=api", "vulnerability_id": "VCID-mv93-73qb-ekgt", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590", "reference_id": "800590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132", "reference_id": "CVE-2012-1132", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=api", "vulnerability_id": "VCID-n99m-fgj7-y3bk", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597", "reference_id": "800597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138", "reference_id": "CVE-2012-1138", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1138" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=api", "vulnerability_id": "VCID-nakp-vmxa-akey", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78464", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78478", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78504", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78537", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78533", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086", "reference_id": "1191086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9664" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=api", "vulnerability_id": "VCID-p2yw-ksc4-jfe9", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.8955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04849", "scoring_system": "epss", "scoring_elements": "0.89552", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082", "reference_id": "1191082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9660" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=api", "vulnerability_id": "VCID-p8h9-9xku-hbhv", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80537", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80624", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01421", "scoring_system": "epss", "scoring_elements": "0.80628", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089", "reference_id": "1191089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9666" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=api", "vulnerability_id": "VCID-pznp-81q7-z3d4", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81172", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01518", "scoring_system": "epss", "scoring_elements": "0.81273", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080", "reference_id": "1191080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9658" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36612?format=api", "vulnerability_id": "VCID-qu13-pxwm-d3da", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86453", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86501", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86526", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86532", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02977", "scoring_system": "epss", "scoring_elements": "0.86538", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37907" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094", "reference_id": "890094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670", "reference_id": "CVE-2012-5670", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5670" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36611?format=api", "vulnerability_id": "VCID-s9u5-4nwv-vudq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.8225", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82155", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82219", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01687", "scoring_system": "epss", "scoring_elements": "0.82249", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37906" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088", "reference_id": "890088", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669", "reference_id": "CVE-2012-5669", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0216", "reference_id": "RHSA-2013:0216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0216" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5669" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=api", "vulnerability_id": "VCID-th47-m45d-m7dk", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.8378", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02029", "scoring_system": "epss", "scoring_elements": "0.83827", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090", "reference_id": "1191090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9667" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=api", "vulnerability_id": "VCID-tu7r-tsp8-73ew", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88717", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88751", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88768", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04219", "scoring_system": "epss", "scoring_elements": "0.88772", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096", "reference_id": "1191096", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9673" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=api", "vulnerability_id": "VCID-u15r-u7zz-17ad", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89341", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89368", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89364", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.8938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04704", "scoring_system": "epss", "scoring_elements": "0.89376", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095", "reference_id": "1191095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9672" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=api", "vulnerability_id": "VCID-uh3u-pzzg-fkgg", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.8961", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89613", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89655", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04948", "scoring_system": "epss", "scoring_elements": "0.89659", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083", "reference_id": "1191083", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696", "reference_id": "RHSA-2015:0696", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0696" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9661" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=api", "vulnerability_id": "VCID-uhnk-v91u-p7e5", "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n resulting in Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85253", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.8527", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02464", "scoring_system": "epss", "scoring_elements": "0.85271", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078", "reference_id": "1191078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656", "reference_id": "777656", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656" }, { "reference_url": "https://security.gentoo.org/glsa/201503-05", "reference_id": "GLSA-201503-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201503-05" }, { "reference_url": "https://usn.ubuntu.com/2510-1/", "reference_id": "USN-2510-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2510-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035560?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3" } ], "aliases": [ "CVE-2014-9656" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35804?format=api", "vulnerability_id": "VCID-v6um-wgpt-myax", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91116", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91125", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91152", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122", "reference_id": "649122", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799", "reference_id": "753799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1455", "reference_id": "RHSA-2011:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2011-3439" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=api", "vulnerability_id": "VCID-wapu-grak-1bca", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90575", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592", "reference_id": "800592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134", "reference_id": "CVE-2012-1134", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1134" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=api", "vulnerability_id": "VCID-xe45-fv7j-4ucr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86784", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8681", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581", "reference_id": "800581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126", "reference_id": "CVE-2012-1126", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1126" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36610?format=api", "vulnerability_id": "VCID-xyay-hhmw-cyb1", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n context-dependent attackers to possibly execute arbitrary code or cause\n Denial of Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86077", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86133", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86146", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.8616", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02815", "scoring_system": "epss", "scoring_elements": "0.86165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" }, { "reference_url": "http://secunia.com/advisories/51826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51826" }, { "reference_url": "http://secunia.com/advisories/51900", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51900" }, { "reference_url": "https://savannah.nongnu.org/bugs/?37905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?37905" }, { "reference_url": "http://www.freetype.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freetype.org/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2" }, { "reference_url": "http://www.securitytracker.com/id?1027921", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027921" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1686-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1686-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691", "reference_id": "696691", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087", "reference_id": "890087", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668", "reference_id": "CVE-2012-5668", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668" }, { "reference_url": "https://security.gentoo.org/glsa/201402-16", "reference_id": "GLSA-201402-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201402-16" }, { "reference_url": "https://usn.ubuntu.com/1686-1/", "reference_id": "USN-1686-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1686-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-5668" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=api", "vulnerability_id": "VCID-zpnw-kwqf-63bp", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78055", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78062", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78016", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78028", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747", "reference_id": "CVE-2014-9747", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9747" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=api", "vulnerability_id": "VCID-zu7v-a14h-2ueu", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594", "reference_id": "800594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136", "reference_id": "CVE-2012-1136", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-1136" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }