Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/74216?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "type": "ebuild", "namespace": "media-libs", "name": "freetype", "version": "2.4.8", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.4.9", "latest_non_vulnerable_version": "2.13.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35801?format=api", "vulnerability_id": "VCID-3vb1-m8xt-kfcf", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88843", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88912", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88911", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04314", "scoring_system": "epss", "scoring_elements": "0.88907", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" }, { "reference_url": "http://secunia.com/advisories/42289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42289" }, { "reference_url": "http://secunia.com/advisories/42295", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42295" }, { "reference_url": "http://secunia.com/advisories/43138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43138" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?31310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?31310" }, { "reference_url": "http://support.apple.com/kb/HT4564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4564" }, { "reference_url": "http://support.apple.com/kb/HT4565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4565" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "http://support.apple.com/kb/HT4802", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4802" }, { "reference_url": "http://support.apple.com/kb/HT4803", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4803" }, { "reference_url": "http://support.avaya.com/css/P8/documents/100122733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/css/P8/documents/100122733" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2155", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2155" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html" }, { "reference_url": "http://www.securityfocus.com/bid/44214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44214" }, { "reference_url": "http://www.securitytracker.com/id?1024745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024745" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3037" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "602221", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275", "reference_id": "645275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855", "reference_id": "CVE-2010-3855", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0889", "reference_id": "RHSA-2010:0889", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0889" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-3855" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=api", "vulnerability_id": "VCID-3xz8-4wu5-fugq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85771", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30263" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167", "reference_id": "613167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500", "reference_id": "CVE-2010-2500", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2500" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35794?format=api", "vulnerability_id": "VCID-48rk-qwp7-j7a8", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.8995", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89898", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89903", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.8993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89923", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89939", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05194", "scoring_system": "epss", "scoring_elements": "0.89934", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30657", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30657" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627", "reference_id": "625627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807", "reference_id": "CVE-2010-2807", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2807" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=api", "vulnerability_id": "VCID-4wp3-qsuc-1kh9", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92754", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.9276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92765", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92772", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.9278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92781", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09383", "scoring_system": "epss", "scoring_elements": "0.92795", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30656" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980", "reference_id": "621980", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806", "reference_id": "CVE-2010-2806", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2806" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=api", "vulnerability_id": "VCID-57th-r73p-a3fy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127912955808467&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127912955808467&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84873", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.8481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84817", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84847", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527" }, { "reference_url": "http://savannah.nongnu.org/bugs/?30054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://savannah.nongnu.org/bugs/?30054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557", "reference_id": "614557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527", "reference_id": "CVE-2010-2527", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2527" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35800?format=api", "vulnerability_id": "VCID-64dt-nnzb-mkfc", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90386", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90332", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90373", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.90372", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05648", "scoring_system": "epss", "scoring_elements": "0.9037", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/43138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43138" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://security-tracker.debian.org/tracker/CVE-2010-3814", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security-tracker.debian.org/tracker/CVE-2010-3814" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "http://www.debian.org/security/2011/dsa-2155", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2011/dsa-2155" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236" }, { "reference_url": "http://www.securityfocus.com/bid/44643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/44643" }, { "reference_url": "http://www.securitytracker.com/id?1024767", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1024767" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0246" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221", "reference_id": "602221", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814", "reference_id": "CVE-2010-3814", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-3814" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35799?format=api", "vulnerability_id": "VCID-7698-fwj1-fufd", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87893", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87879", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87876", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.8782", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87835", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87863", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.87866", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03648", "scoring_system": "epss", "scoring_elements": "0.8788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04785", "scoring_system": "epss", "scoring_elements": "0.89433", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2116", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2116" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/43700", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/43700" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1013-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1013-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625", "reference_id": "623625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311", "reference_id": "CVE-2010-3311", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/1013-1/", "reference_id": "USN-1013-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1013-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-3311" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35802?format=api", "vulnerability_id": "VCID-79js-ywyp-x3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93274", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93283", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93289", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93288", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93296", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93305", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93303", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93304", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93322", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93334", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10653", "scoring_system": "epss", "scoring_elements": "0.93338", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871", "reference_id": "635871", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701", "reference_id": "722701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1085", "reference_id": "RHSA-2011:1085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1085" }, { "reference_url": "https://usn.ubuntu.com/1173-1/", "reference_id": "USN-1173-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1173-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2011-0226" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=api", "vulnerability_id": "VCID-ahxa-yjxp-a7en", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87412", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8733", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87396", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30248" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30249", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30249" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162", "reference_id": "613162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499", "reference_id": "CVE-2010-2499", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2499" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35782?format=api", "vulnerability_id": "VCID-bt31-xk8r-8qd2", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84074", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83983", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.83987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84046", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02089", "scoring_system": "epss", "scoring_elements": "0.84048", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30082", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30082" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30083", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30083" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154", "reference_id": "613154", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497", "reference_id": "CVE-2010-2497", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2497" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=api", "vulnerability_id": "VCID-cwfg-1d6f-hfgg", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128110167119337&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128110167119337&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91989", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91959", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.9198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07802", "scoring_system": "epss", "scoring_elements": "0.91993", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30658" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907", "reference_id": "621907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808", "reference_id": "CVE-2010-2808", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2808" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=api", "vulnerability_id": "VCID-gcht-dzky-fbay", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88206", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88229", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88254", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88264", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88263", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03893", "scoring_system": "epss", "scoring_elements": "0.88275", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html" }, { "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.securityfocus.com/bid/42621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42621" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632", "reference_id": "625632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054", "reference_id": "CVE-2010-3054", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736", "reference_id": "RHSA-2010:0736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737", "reference_id": "RHSA-2010:0737", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0737" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-3054" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35803?format=api", "vulnerability_id": "VCID-gcr7-xxtw-e3bs", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85299", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85311", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.8533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85331", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02511", "scoring_system": "epss", "scoring_elements": "0.85371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87114", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87118", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03238", "scoring_system": "epss", "scoring_elements": "0.87133", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120", "reference_id": "646120", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226", "reference_id": "746226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1402", "reference_id": "RHSA-2011:1402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2011-3256" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=api", "vulnerability_id": "VCID-gmk4-9sks-s3a5", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89295", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342", "reference_id": "617342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541", "reference_id": "CVE-2010-2541", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2541" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=api", "vulnerability_id": "VCID-pzsb-3h3d-t7hq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85771", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30106" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160", "reference_id": "613160", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498", "reference_id": "CVE-2010-2498", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2498" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35789?format=api", "vulnerability_id": "VCID-tyhk-9jvd-y7bj", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86941", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86877", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86891", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86912", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86902", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03154", "scoring_system": "epss", "scoring_elements": "0.86924", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30361" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198", "reference_id": "613198", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520", "reference_id": "CVE-2010-2520", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2520" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35804?format=api", "vulnerability_id": "VCID-v6um-wgpt-myax", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91075", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91081", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91116", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91125", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91152", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06537", "scoring_system": "epss", "scoring_elements": "0.91165", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122", "reference_id": "649122", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799", "reference_id": "753799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1455", "reference_id": "RHSA-2011:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094", "reference_id": "RHSA-2012:0094", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0094" }, { "reference_url": "https://usn.ubuntu.com/1267-1/", "reference_id": "USN-1267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2011-3439" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35781?format=api", "vulnerability_id": "VCID-vykx-mb8e-hyfv", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html" }, { "reference_url": "http://osvdb.org/66828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/66828" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98266", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98242", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98245", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98248", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98254", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98257", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98263", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.5972", "scoring_system": "epss", "scoring_elements": "0.98264", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" }, { "reference_url": "http://secunia.com/advisories/40807", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40807" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "http://support.apple.com/kb/HT4291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4291" }, { "reference_url": "http://support.apple.com/kb/HT4292", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4292" }, { "reference_url": "http://www.exploit-db.com/exploits/14538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/14538" }, { "reference_url": "http://www.f-secure.com/weblog/archives/00002002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.f-secure.com/weblog/archives/00002002.html" }, { "reference_url": "http://www.securityfocus.com/bid/42151", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42151" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144", "reference_id": "621144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797", "reference_id": "CVE-2010-1797", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py", "reference_id": "CVE-2010-1797;OSVDB-66828", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt", "reference_id": "CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0607", "reference_id": "RHSA-2010:0607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0607" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-1797" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=api", "vulnerability_id": "VCID-wbve-vpw4-tqhe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89183", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89167", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30306", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30306" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194", "reference_id": "613194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519", "reference_id": "CVE-2010-2519", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2519" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35797?format=api", "vulnerability_id": "VCID-yq1k-j2t6-e7g5", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82352", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82226", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.8228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82288", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82301", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82295", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.8233", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01701", "scoring_system": "epss", "scoring_elements": "0.82332", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630", "reference_id": "625630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053", "reference_id": "CVE-2010-3053", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-3053" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35792?format=api", "vulnerability_id": "VCID-zn5p-qvxr-fqhx", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90305", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90347", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90362", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05634", "scoring_system": "epss", "scoring_elements": "0.90361", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" }, { "reference_url": "http://secunia.com/advisories/40816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40816" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30644" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html" }, { "reference_url": "http://www.securityfocus.com/bid/42285", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42285" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2018", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2018" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626", "reference_id": "625626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805", "reference_id": "CVE-2010-2805", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864", "reference_id": "RHSA-2010:0864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0864" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/74216?format=api", "purl": "pkg:ebuild/media-libs/freetype@2.4.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" } ], "aliases": [ "CVE-2010-2805" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.8" }