Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
Typedeb
Namespacedebian
Namefreetype
Version2.12.1+dfsg-5+deb12u4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.13.1+dfsg-1
Latest_non_vulnerable_version2.14.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-17au-pc1k-m7at
vulnerability_id VCID-17au-pc1k-m7at
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9662
reference_id
reference_type
scores
0
value 0.05416
scoring_system epss
scoring_elements 0.90103
published_at 2026-04-01T12:55:00Z
1
value 0.05416
scoring_system epss
scoring_elements 0.90106
published_at 2026-04-02T12:55:00Z
2
value 0.05416
scoring_system epss
scoring_elements 0.90118
published_at 2026-04-04T12:55:00Z
3
value 0.05416
scoring_system epss
scoring_elements 0.90122
published_at 2026-04-07T12:55:00Z
4
value 0.05416
scoring_system epss
scoring_elements 0.90138
published_at 2026-04-08T12:55:00Z
5
value 0.05416
scoring_system epss
scoring_elements 0.90144
published_at 2026-04-09T12:55:00Z
6
value 0.05416
scoring_system epss
scoring_elements 0.90152
published_at 2026-04-11T12:55:00Z
7
value 0.05416
scoring_system epss
scoring_elements 0.90151
published_at 2026-04-12T12:55:00Z
8
value 0.05416
scoring_system epss
scoring_elements 0.90146
published_at 2026-04-13T12:55:00Z
9
value 0.05416
scoring_system epss
scoring_elements 0.90163
published_at 2026-04-18T12:55:00Z
10
value 0.05416
scoring_system epss
scoring_elements 0.9016
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191084
reference_id 1191084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191084
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9662
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at
1
url VCID-1teu-tz69-dff8
vulnerability_id VCID-1teu-tz69-dff8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
reference_id
reference_type
scores
0
value 0.02697
scoring_system epss
scoring_elements 0.85888
published_at 2026-04-21T12:55:00Z
1
value 0.02697
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-01T12:55:00Z
2
value 0.02697
scoring_system epss
scoring_elements 0.85816
published_at 2026-04-02T12:55:00Z
3
value 0.02697
scoring_system epss
scoring_elements 0.85834
published_at 2026-04-04T12:55:00Z
4
value 0.02697
scoring_system epss
scoring_elements 0.85838
published_at 2026-04-07T12:55:00Z
5
value 0.02697
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-08T12:55:00Z
6
value 0.02697
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-09T12:55:00Z
7
value 0.02697
scoring_system epss
scoring_elements 0.85881
published_at 2026-04-11T12:55:00Z
8
value 0.02697
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-12T12:55:00Z
9
value 0.02697
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-13T12:55:00Z
10
value 0.02697
scoring_system epss
scoring_elements 0.85892
published_at 2026-04-16T12:55:00Z
11
value 0.02697
scoring_system epss
scoring_elements 0.85897
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800584
reference_id 800584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
reference_id CVE-2012-1128
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1128
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8
2
url VCID-1ws8-ww77-ybah
vulnerability_id VCID-1ws8-ww77-ybah
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9674
reference_id
reference_type
scores
0
value 0.05124
scoring_system epss
scoring_elements 0.89815
published_at 2026-04-01T12:55:00Z
1
value 0.05124
scoring_system epss
scoring_elements 0.89818
published_at 2026-04-02T12:55:00Z
2
value 0.05124
scoring_system epss
scoring_elements 0.89832
published_at 2026-04-04T12:55:00Z
3
value 0.05124
scoring_system epss
scoring_elements 0.89837
published_at 2026-04-07T12:55:00Z
4
value 0.05124
scoring_system epss
scoring_elements 0.89854
published_at 2026-04-08T12:55:00Z
5
value 0.05124
scoring_system epss
scoring_elements 0.8986
published_at 2026-04-09T12:55:00Z
6
value 0.05124
scoring_system epss
scoring_elements 0.89866
published_at 2026-04-11T12:55:00Z
7
value 0.05124
scoring_system epss
scoring_elements 0.89864
published_at 2026-04-12T12:55:00Z
8
value 0.05124
scoring_system epss
scoring_elements 0.89858
published_at 2026-04-13T12:55:00Z
9
value 0.05124
scoring_system epss
scoring_elements 0.89871
published_at 2026-04-18T12:55:00Z
10
value 0.05124
scoring_system epss
scoring_elements 0.89865
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9674
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191190
reference_id 1191190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191190
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
7
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9674
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah
3
url VCID-2fsn-uxp3-fbeg
vulnerability_id VCID-2fsn-uxp3-fbeg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800587
reference_id 800587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800587
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
reference_id CVE-2012-1130
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1130
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg
4
url VCID-2kj7-a6r9-bfft
vulnerability_id VCID-2kj7-a6r9-bfft
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1806
reference_id
reference_type
scores
0
value 0.03824
scoring_system epss
scoring_elements 0.88148
published_at 2026-04-21T12:55:00Z
1
value 0.03824
scoring_system epss
scoring_elements 0.88079
published_at 2026-04-01T12:55:00Z
2
value 0.03824
scoring_system epss
scoring_elements 0.88088
published_at 2026-04-02T12:55:00Z
3
value 0.03824
scoring_system epss
scoring_elements 0.88103
published_at 2026-04-04T12:55:00Z
4
value 0.03824
scoring_system epss
scoring_elements 0.88109
published_at 2026-04-07T12:55:00Z
5
value 0.03824
scoring_system epss
scoring_elements 0.88128
published_at 2026-04-08T12:55:00Z
6
value 0.03824
scoring_system epss
scoring_elements 0.88134
published_at 2026-04-09T12:55:00Z
7
value 0.03824
scoring_system epss
scoring_elements 0.88143
published_at 2026-04-11T12:55:00Z
8
value 0.03824
scoring_system epss
scoring_elements 0.88136
published_at 2026-04-12T12:55:00Z
9
value 0.03824
scoring_system epss
scoring_elements 0.88137
published_at 2026-04-13T12:55:00Z
10
value 0.03824
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1806
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
27
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
28
reference_url http://securitytracker.com/id?1020238
reference_id
reference_type
scores
url http://securitytracker.com/id?1020238
29
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
30
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
33
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
34
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
39
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
41
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
43
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
45
reference_url http://www.securityfocus.com/bid/29640
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29640
46
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
47
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
48
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
49
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
50
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
51
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
52
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
53
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
54
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
55
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
56
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
57
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
58
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450768
reference_id 450768
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450768
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1806
reference_id CVE-2008-1806
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1806
66
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
67
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
68
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
69
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
70
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.3.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.3.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-1806
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft
5
url VCID-38u1-6t8n-gqey
vulnerability_id VCID-38u1-6t8n-gqey
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
reference_id
reference_type
scores
0
value 0.02148
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-21T12:55:00Z
1
value 0.02148
scoring_system epss
scoring_elements 0.84163
published_at 2026-04-01T12:55:00Z
2
value 0.02148
scoring_system epss
scoring_elements 0.84177
published_at 2026-04-02T12:55:00Z
3
value 0.02148
scoring_system epss
scoring_elements 0.84195
published_at 2026-04-04T12:55:00Z
4
value 0.02148
scoring_system epss
scoring_elements 0.84196
published_at 2026-04-07T12:55:00Z
5
value 0.02148
scoring_system epss
scoring_elements 0.84218
published_at 2026-04-08T12:55:00Z
6
value 0.02148
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-09T12:55:00Z
7
value 0.02148
scoring_system epss
scoring_elements 0.84242
published_at 2026-04-11T12:55:00Z
8
value 0.02148
scoring_system epss
scoring_elements 0.84236
published_at 2026-04-12T12:55:00Z
9
value 0.02148
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-13T12:55:00Z
10
value 0.02148
scoring_system epss
scoring_elements 0.84255
published_at 2026-04-16T12:55:00Z
11
value 0.02148
scoring_system epss
scoring_elements 0.84256
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800606
reference_id 800606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
reference_id CVE-2012-1143
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1143
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey
6
url VCID-3h73-kffw-hfbc
vulnerability_id VCID-3h73-kffw-hfbc
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10328.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10328.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10328
reference_id
reference_type
scores
0
value 0.00979
scoring_system epss
scoring_elements 0.76691
published_at 2026-04-01T12:55:00Z
1
value 0.00979
scoring_system epss
scoring_elements 0.76786
published_at 2026-04-21T12:55:00Z
2
value 0.00979
scoring_system epss
scoring_elements 0.76749
published_at 2026-04-13T12:55:00Z
3
value 0.00979
scoring_system epss
scoring_elements 0.76777
published_at 2026-04-11T12:55:00Z
4
value 0.00979
scoring_system epss
scoring_elements 0.76757
published_at 2026-04-12T12:55:00Z
5
value 0.00979
scoring_system epss
scoring_elements 0.7679
published_at 2026-04-16T12:55:00Z
6
value 0.00979
scoring_system epss
scoring_elements 0.76795
published_at 2026-04-18T12:55:00Z
7
value 0.00979
scoring_system epss
scoring_elements 0.76695
published_at 2026-04-02T12:55:00Z
8
value 0.00979
scoring_system epss
scoring_elements 0.76724
published_at 2026-04-04T12:55:00Z
9
value 0.00979
scoring_system epss
scoring_elements 0.76706
published_at 2026-04-07T12:55:00Z
10
value 0.00979
scoring_system epss
scoring_elements 0.76738
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10328
3
reference_url http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
7
reference_url http://www.securityfocus.com/bid/97677
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97677
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444895
reference_id 1444895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444895
9
reference_url https://security.archlinux.org/AVG-251
reference_id AVG-251
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-251
10
reference_url https://security.archlinux.org/AVG-252
reference_id AVG-252
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-252
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10328
reference_id CVE-2016-10328
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10328
14
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
15
reference_url https://usn.ubuntu.com/3263-1/
reference_id USN-3263-1
reference_type
scores
url https://usn.ubuntu.com/3263-1/
fixed_packages
0
url pkg:deb/debian/freetype@0?distro=trixie
purl pkg:deb/debian/freetype@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-10328
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3h73-kffw-hfbc
7
url VCID-3jn7-t1f6-uyfr
vulnerability_id VCID-3jn7-t1f6-uyfr
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9657
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81172
published_at 2026-04-01T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-02T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81204
published_at 2026-04-07T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81232
published_at 2026-04-08T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-09T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-11T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-12T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.81236
published_at 2026-04-13T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81272
published_at 2026-04-16T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81274
published_at 2026-04-18T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191079
reference_id 1191079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191079
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9657
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr
8
url VCID-3vb1-m8xt-kfcf
vulnerability_id VCID-3vb1-m8xt-kfcf
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a
2
reference_url http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html
4
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
5
reference_url http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html
6
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html
8
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html
9
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3855
reference_id
reference_type
scores
0
value 0.04314
scoring_system epss
scoring_elements 0.88907
published_at 2026-04-21T12:55:00Z
1
value 0.04314
scoring_system epss
scoring_elements 0.88843
published_at 2026-04-01T12:55:00Z
2
value 0.04314
scoring_system epss
scoring_elements 0.88852
published_at 2026-04-02T12:55:00Z
3
value 0.04314
scoring_system epss
scoring_elements 0.88867
published_at 2026-04-04T12:55:00Z
4
value 0.04314
scoring_system epss
scoring_elements 0.88869
published_at 2026-04-07T12:55:00Z
5
value 0.04314
scoring_system epss
scoring_elements 0.88887
published_at 2026-04-08T12:55:00Z
6
value 0.04314
scoring_system epss
scoring_elements 0.88892
published_at 2026-04-09T12:55:00Z
7
value 0.04314
scoring_system epss
scoring_elements 0.88904
published_at 2026-04-11T12:55:00Z
8
value 0.04314
scoring_system epss
scoring_elements 0.88898
published_at 2026-04-13T12:55:00Z
9
value 0.04314
scoring_system epss
scoring_elements 0.88912
published_at 2026-04-16T12:55:00Z
10
value 0.04314
scoring_system epss
scoring_elements 0.88911
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3855
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855
13
reference_url http://secunia.com/advisories/42289
reference_id
reference_type
scores
url http://secunia.com/advisories/42289
14
reference_url http://secunia.com/advisories/42295
reference_id
reference_type
scores
url http://secunia.com/advisories/42295
15
reference_url http://secunia.com/advisories/43138
reference_id
reference_type
scores
url http://secunia.com/advisories/43138
16
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
17
reference_url https://savannah.nongnu.org/bugs/?31310
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?31310
18
reference_url http://support.apple.com/kb/HT4564
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4564
19
reference_url http://support.apple.com/kb/HT4565
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4565
20
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
21
reference_url http://support.apple.com/kb/HT4802
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4802
22
reference_url http://support.apple.com/kb/HT4803
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4803
23
reference_url http://support.avaya.com/css/P8/documents/100122733
reference_id
reference_type
scores
url http://support.avaya.com/css/P8/documents/100122733
24
reference_url http://www.debian.org/security/2011/dsa-2155
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2155
25
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:235
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
27
reference_url http://www.redhat.com/support/errata/RHSA-2010-0889.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0889.html
28
reference_url http://www.securityfocus.com/bid/44214
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44214
29
reference_url http://www.securitytracker.com/id?1024745
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024745
30
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
31
reference_url http://www.vupen.com/english/advisories/2010/3037
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3037
32
reference_url http://www.vupen.com/english/advisories/2011/0246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0246
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id 602221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=645275
reference_id 645275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=645275
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3855
reference_id CVE-2010-3855
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3855
68
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
69
reference_url https://access.redhat.com/errata/RHSA-2010:0889
reference_id RHSA-2010:0889
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0889
70
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3855
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf
9
url VCID-3wjn-8gnc-gkhr
vulnerability_id VCID-3wjn-8gnc-gkhr
summary
Multiple vulnerabilities in FreeType might result in the remote execution
    of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
1
reference_url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
reference_id
reference_type
scores
url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
4
reference_url http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
5
reference_url http://osvdb.org/36509
reference_id
reference_type
scores
url http://osvdb.org/36509
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2754
reference_id
reference_type
scores
0
value 0.41922
scoring_system epss
scoring_elements 0.9744
published_at 2026-04-21T12:55:00Z
1
value 0.41922
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-01T12:55:00Z
2
value 0.41922
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-02T12:55:00Z
3
value 0.41922
scoring_system epss
scoring_elements 0.97413
published_at 2026-04-04T12:55:00Z
4
value 0.41922
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-07T12:55:00Z
5
value 0.41922
scoring_system epss
scoring_elements 0.97422
published_at 2026-04-08T12:55:00Z
6
value 0.41922
scoring_system epss
scoring_elements 0.97423
published_at 2026-04-09T12:55:00Z
7
value 0.41922
scoring_system epss
scoring_elements 0.97426
published_at 2026-04-11T12:55:00Z
8
value 0.41922
scoring_system epss
scoring_elements 0.97427
published_at 2026-04-12T12:55:00Z
9
value 0.41922
scoring_system epss
scoring_elements 0.97428
published_at 2026-04-13T12:55:00Z
10
value 0.41922
scoring_system epss
scoring_elements 0.97436
published_at 2026-04-16T12:55:00Z
11
value 0.41922
scoring_system epss
scoring_elements 0.97441
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2754
8
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=502565
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=502565
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
11
reference_url http://secunia.com/advisories/25350
reference_id
reference_type
scores
url http://secunia.com/advisories/25350
12
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
13
reference_url http://secunia.com/advisories/25386
reference_id
reference_type
scores
url http://secunia.com/advisories/25386
14
reference_url http://secunia.com/advisories/25463
reference_id
reference_type
scores
url http://secunia.com/advisories/25463
15
reference_url http://secunia.com/advisories/25483
reference_id
reference_type
scores
url http://secunia.com/advisories/25483
16
reference_url http://secunia.com/advisories/25609
reference_id
reference_type
scores
url http://secunia.com/advisories/25609
17
reference_url http://secunia.com/advisories/25612
reference_id
reference_type
scores
url http://secunia.com/advisories/25612
18
reference_url http://secunia.com/advisories/25654
reference_id
reference_type
scores
url http://secunia.com/advisories/25654
19
reference_url http://secunia.com/advisories/25705
reference_id
reference_type
scores
url http://secunia.com/advisories/25705
20
reference_url http://secunia.com/advisories/25808
reference_id
reference_type
scores
url http://secunia.com/advisories/25808
21
reference_url http://secunia.com/advisories/25894
reference_id
reference_type
scores
url http://secunia.com/advisories/25894
22
reference_url http://secunia.com/advisories/25905
reference_id
reference_type
scores
url http://secunia.com/advisories/25905
23
reference_url http://secunia.com/advisories/26129
reference_id
reference_type
scores
url http://secunia.com/advisories/26129
24
reference_url http://secunia.com/advisories/26305
reference_id
reference_type
scores
url http://secunia.com/advisories/26305
25
reference_url http://secunia.com/advisories/28298
reference_id
reference_type
scores
url http://secunia.com/advisories/28298
26
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
27
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
28
reference_url http://secunia.com/advisories/35200
reference_id
reference_type
scores
url http://secunia.com/advisories/35200
29
reference_url http://secunia.com/advisories/35204
reference_id
reference_type
scores
url http://secunia.com/advisories/35204
30
reference_url http://secunia.com/advisories/35233
reference_id
reference_type
scores
url http://secunia.com/advisories/35233
31
reference_url https://issues.rpath.com/browse/RPL-1390
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1390
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
35
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
36
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
37
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
38
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
39
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
40
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
41
reference_url http://www.debian.org/security/2007/dsa-1302
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1302
42
reference_url http://www.debian.org/security/2007/dsa-1334
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1334
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
44
reference_url http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
45
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
47
reference_url http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
48
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
49
reference_url http://www.redhat.com/support/errata/RHSA-2007-0403.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0403.html
50
reference_url http://www.redhat.com/support/errata/RHSA-2009-0329.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0329.html
51
reference_url http://www.redhat.com/support/errata/RHSA-2009-1062.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-1062.html
52
reference_url http://www.securityfocus.com/archive/1/469463/100/200/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/469463/100/200/threaded
53
reference_url http://www.securityfocus.com/archive/1/471286/30/6180/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471286/30/6180/threaded
54
reference_url http://www.securityfocus.com/bid/24074
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24074
55
reference_url http://www.securitytracker.com/id?1018088
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018088
56
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
57
reference_url http://www.ubuntu.com/usn/usn-466-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-466-1
58
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
59
reference_url http://www.vupen.com/english/advisories/2007/1894
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1894
60
reference_url http://www.vupen.com/english/advisories/2007/2229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2229
61
reference_url http://www.vupen.com/english/advisories/2008/0049
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0049
62
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=240200
reference_id 240200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=240200
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625
reference_id 425625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2754
reference_id CVE-2007-2754
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2754
67
reference_url https://security.gentoo.org/glsa/200705-22
reference_id GLSA-200705-22
reference_type
scores
url https://security.gentoo.org/glsa/200705-22
68
reference_url https://security.gentoo.org/glsa/200707-02
reference_id GLSA-200707-02
reference_type
scores
url https://security.gentoo.org/glsa/200707-02
69
reference_url https://security.gentoo.org/glsa/201006-01
reference_id GLSA-201006-01
reference_type
scores
url https://security.gentoo.org/glsa/201006-01
70
reference_url https://access.redhat.com/errata/RHSA-2007:0403
reference_id RHSA-2007:0403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0403
71
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
72
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
73
reference_url https://usn.ubuntu.com/466-1/
reference_id USN-466-1
reference_type
scores
url https://usn.ubuntu.com/466-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.2.1-6?distro=trixie
purl pkg:deb/debian/freetype@2.2.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-6%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-2754
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjn-8gnc-gkhr
10
url VCID-3xz8-4wu5-fugq
vulnerability_id VCID-3xz8-4wu5-fugq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30263
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30263
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613167
reference_id 613167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613167
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
reference_id CVE-2010-2500
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2500
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq
11
url VCID-468g-dxsr-8yer
vulnerability_id VCID-468g-dxsr-8yer
summary
A vulnerability in FreeType could result in execution of arbitrary
    code or Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2240
reference_id
reference_type
scores
0
value 0.01867
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-01T12:55:00Z
1
value 0.01867
scoring_system epss
scoring_elements 0.83028
published_at 2026-04-02T12:55:00Z
2
value 0.01867
scoring_system epss
scoring_elements 0.83042
published_at 2026-04-04T12:55:00Z
3
value 0.01867
scoring_system epss
scoring_elements 0.8304
published_at 2026-04-07T12:55:00Z
4
value 0.01867
scoring_system epss
scoring_elements 0.83065
published_at 2026-04-08T12:55:00Z
5
value 0.01867
scoring_system epss
scoring_elements 0.83072
published_at 2026-04-09T12:55:00Z
6
value 0.01867
scoring_system epss
scoring_elements 0.83088
published_at 2026-04-11T12:55:00Z
7
value 0.01867
scoring_system epss
scoring_elements 0.83082
published_at 2026-04-12T12:55:00Z
8
value 0.01867
scoring_system epss
scoring_elements 0.83078
published_at 2026-04-13T12:55:00Z
9
value 0.01867
scoring_system epss
scoring_elements 0.83116
published_at 2026-04-18T12:55:00Z
10
value 0.01867
scoring_system epss
scoring_elements 0.83119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
reference_id 1074646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
reference_id 741299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
5
reference_url https://security.gentoo.org/glsa/201408-02
reference_id GLSA-201408-02
reference_type
scores
url https://security.gentoo.org/glsa/201408-02
6
reference_url https://usn.ubuntu.com/2148-1/
reference_id USN-2148-1
reference_type
scores
url https://usn.ubuntu.com/2148-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-2240
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer
12
url VCID-48rk-qwp7-j7a8
vulnerability_id VCID-48rk-qwp7-j7a8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
reference_id
reference_type
scores
0
value 0.05194
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-21T12:55:00Z
1
value 0.05194
scoring_system epss
scoring_elements 0.89882
published_at 2026-04-01T12:55:00Z
2
value 0.05194
scoring_system epss
scoring_elements 0.89885
published_at 2026-04-02T12:55:00Z
3
value 0.05194
scoring_system epss
scoring_elements 0.89898
published_at 2026-04-04T12:55:00Z
4
value 0.05194
scoring_system epss
scoring_elements 0.89903
published_at 2026-04-07T12:55:00Z
5
value 0.05194
scoring_system epss
scoring_elements 0.89919
published_at 2026-04-08T12:55:00Z
6
value 0.05194
scoring_system epss
scoring_elements 0.89924
published_at 2026-04-09T12:55:00Z
7
value 0.05194
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-11T12:55:00Z
8
value 0.05194
scoring_system epss
scoring_elements 0.8993
published_at 2026-04-12T12:55:00Z
9
value 0.05194
scoring_system epss
scoring_elements 0.89923
published_at 2026-04-13T12:55:00Z
10
value 0.05194
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-16T12:55:00Z
11
value 0.05194
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://savannah.nongnu.org/bugs/?30657
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30657
15
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
16
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
17
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
18
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
19
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
20
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
21
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
22
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
23
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625627
reference_id 625627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625627
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
reference_id CVE-2010-2807
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
35
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
36
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2807
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8
13
url VCID-4wp3-qsuc-1kh9
vulnerability_id VCID-4wp3-qsuc-1kh9
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
reference_id
reference_type
scores
0
value 0.09383
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-21T12:55:00Z
1
value 0.09383
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-01T12:55:00Z
2
value 0.09383
scoring_system epss
scoring_elements 0.9276
published_at 2026-04-02T12:55:00Z
3
value 0.09383
scoring_system epss
scoring_elements 0.92765
published_at 2026-04-04T12:55:00Z
4
value 0.09383
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-07T12:55:00Z
5
value 0.09383
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-08T12:55:00Z
6
value 0.09383
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-09T12:55:00Z
7
value 0.09383
scoring_system epss
scoring_elements 0.92782
published_at 2026-04-11T12:55:00Z
8
value 0.09383
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-12T12:55:00Z
9
value 0.09383
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-13T12:55:00Z
10
value 0.09383
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30656
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30656
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621980
reference_id 621980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621980
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
reference_id CVE-2010-2806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
40
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
41
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
42
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2806
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9
14
url VCID-57th-r73p-a3fy
vulnerability_id VCID-57th-r73p-a3fy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
1
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
2
reference_url http://marc.info/?l=oss-security&m=127912955808467&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127912955808467&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
reference_id
reference_type
scores
0
value 0.02329
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-21T12:55:00Z
1
value 0.02329
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-01T12:55:00Z
2
value 0.02329
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-02T12:55:00Z
3
value 0.02329
scoring_system epss
scoring_elements 0.84786
published_at 2026-04-04T12:55:00Z
4
value 0.02329
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-07T12:55:00Z
5
value 0.02329
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-08T12:55:00Z
6
value 0.02329
scoring_system epss
scoring_elements 0.84817
published_at 2026-04-09T12:55:00Z
7
value 0.02329
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-11T12:55:00Z
8
value 0.02329
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-12T12:55:00Z
9
value 0.02329
scoring_system epss
scoring_elements 0.84827
published_at 2026-04-13T12:55:00Z
10
value 0.02329
scoring_system epss
scoring_elements 0.84848
published_at 2026-04-16T12:55:00Z
11
value 0.02329
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
5
reference_url http://savannah.nongnu.org/bugs/?30054
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/?30054
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
7
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
8
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
9
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
12
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=614557
reference_id 614557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=614557
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
reference_id CVE-2010-2527
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
22
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
23
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
24
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2527
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy
15
url VCID-5rpx-8t3t-syhv
vulnerability_id VCID-5rpx-8t3t-syhv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800598
reference_id 800598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800598
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
reference_id CVE-2012-1139
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1139
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv
16
url VCID-5z69-3ht1-kfeh
vulnerability_id VCID-5z69-3ht1-kfeh
summary CVE-2007-3506 Emboldden rendering with a sbit font makes glibc detected.
references
0
reference_url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18
reference_id
reference_type
scores
url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3506
reference_id
reference_type
scores
0
value 0.00742
scoring_system epss
scoring_elements 0.73002
published_at 2026-04-21T12:55:00Z
1
value 0.00742
scoring_system epss
scoring_elements 0.72901
published_at 2026-04-01T12:55:00Z
2
value 0.00742
scoring_system epss
scoring_elements 0.72909
published_at 2026-04-02T12:55:00Z
3
value 0.00742
scoring_system epss
scoring_elements 0.7293
published_at 2026-04-04T12:55:00Z
4
value 0.00742
scoring_system epss
scoring_elements 0.72905
published_at 2026-04-07T12:55:00Z
5
value 0.00742
scoring_system epss
scoring_elements 0.72943
published_at 2026-04-08T12:55:00Z
6
value 0.00742
scoring_system epss
scoring_elements 0.72956
published_at 2026-04-09T12:55:00Z
7
value 0.00742
scoring_system epss
scoring_elements 0.72982
published_at 2026-04-11T12:55:00Z
8
value 0.00742
scoring_system epss
scoring_elements 0.72964
published_at 2026-04-12T12:55:00Z
9
value 0.00742
scoring_system epss
scoring_elements 0.72957
published_at 2026-04-13T12:55:00Z
10
value 0.00742
scoring_system epss
scoring_elements 0.72998
published_at 2026-04-16T12:55:00Z
11
value 0.00742
scoring_system epss
scoring_elements 0.73008
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3506
3
reference_url http://savannah.nongnu.org/bugs/index.php?19536
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/index.php?19536
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506
5
reference_url http://secunia.com/advisories/25884
reference_id
reference_type
scores
url http://secunia.com/advisories/25884
6
reference_url https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970
reference_id
reference_type
scores
url https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970
7
reference_url http://www.securityfocus.com/bid/24708
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24708
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235479
reference_id 235479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235479
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013
reference_id 432013
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3506
reference_id CVE-2007-3506
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-3506
fixed_packages
0
url pkg:deb/debian/freetype@2.3.4?distro=trixie
purl pkg:deb/debian/freetype@2.3.4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.4%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-3506
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5z69-3ht1-kfeh
17
url VCID-613j-8z2t-t3au
vulnerability_id VCID-613j-8z2t-t3au
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800585
reference_id 800585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800585
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
reference_id CVE-2012-1129
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1129
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au
18
url VCID-64dt-nnzb-mkfc
vulnerability_id VCID-64dt-nnzb-mkfc
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3814
reference_id
reference_type
scores
0
value 0.05648
scoring_system epss
scoring_elements 0.9037
published_at 2026-04-21T12:55:00Z
1
value 0.05648
scoring_system epss
scoring_elements 0.90317
published_at 2026-04-01T12:55:00Z
2
value 0.05648
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-02T12:55:00Z
3
value 0.05648
scoring_system epss
scoring_elements 0.90332
published_at 2026-04-04T12:55:00Z
4
value 0.05648
scoring_system epss
scoring_elements 0.90336
published_at 2026-04-07T12:55:00Z
5
value 0.05648
scoring_system epss
scoring_elements 0.90349
published_at 2026-04-08T12:55:00Z
6
value 0.05648
scoring_system epss
scoring_elements 0.90356
published_at 2026-04-09T12:55:00Z
7
value 0.05648
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-12T12:55:00Z
8
value 0.05648
scoring_system epss
scoring_elements 0.90357
published_at 2026-04-13T12:55:00Z
9
value 0.05648
scoring_system epss
scoring_elements 0.90373
published_at 2026-04-16T12:55:00Z
10
value 0.05648
scoring_system epss
scoring_elements 0.90372
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3814
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814
6
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
7
reference_url http://secunia.com/advisories/43138
reference_id
reference_type
scores
url http://secunia.com/advisories/43138
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://security-tracker.debian.org/tracker/CVE-2010-3814
reference_id
reference_type
scores
url http://security-tracker.debian.org/tracker/CVE-2010-3814
10
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
11
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
12
reference_url http://www.debian.org/security/2011/dsa-2155
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2155
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:236
14
reference_url http://www.securityfocus.com/bid/44643
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44643
15
reference_url http://www.securitytracker.com/id?1024767
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024767
16
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url http://www.vupen.com/english/advisories/2011/0246
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0246
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
reference_id 602221
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3814
reference_id CVE-2010-3814
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3814
54
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
55
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3814
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc
19
url VCID-6fzj-746j-bkbc
vulnerability_id VCID-6fzj-746j-bkbc
summary Freetype: Freetype: Information disclosure or denial of service via specially crafted font files
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23865.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23865
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03114
published_at 2026-04-21T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03053
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03077
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03041
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03017
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03009
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02986
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02993
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03047
published_at 2026-04-04T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0305
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23865
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1129606
reference_id 1129606
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1129606
4
reference_url https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/
reference_id 2.14.2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/
url https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2443891
reference_id 2443891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2443891
6
reference_url https://www.facebook.com/security/advisories/cve-2026-23865
reference_id cve-2026-23865
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/
url https://www.facebook.com/security/advisories/cve-2026-23865
7
reference_url https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c
reference_id fc85a255849229c024c8e65f536fe1875d84841c
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/
url https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c
8
reference_url https://usn.ubuntu.com/8086-1/
reference_id USN-8086-1
reference_type
scores
url https://usn.ubuntu.com/8086-1/
fixed_packages
0
url pkg:deb/debian/freetype@0?distro=trixie
purl pkg:deb/debian/freetype@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
6
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2026-23865
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzj-746j-bkbc
20
url VCID-6pzj-1sgf-zbbr
vulnerability_id VCID-6pzj-1sgf-zbbr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800607
reference_id 800607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800607
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
reference_id CVE-2012-1144
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1144
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr
21
url VCID-6xf8-49hw-hfaf
vulnerability_id VCID-6xf8-49hw-hfaf
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66463
published_at 2026-04-01T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66502
published_at 2026-04-02T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66527
published_at 2026-04-04T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66499
published_at 2026-04-07T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-08T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66561
published_at 2026-04-09T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.6658
published_at 2026-04-11T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66568
published_at 2026-04-12T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66536
published_at 2026-04-13T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-21T12:55:00Z
10
value 0.00513
scoring_system epss
scoring_elements 0.66589
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
reference_id 1429965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
reference_id 856971
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
8
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
9
reference_url https://usn.ubuntu.com/3237-1/
reference_id USN-3237-1
reference_type
scores
url https://usn.ubuntu.com/3237-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.1?distro=trixie
purl pkg:deb/debian/freetype@2.6.3-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2016-10244
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf
22
url VCID-6z8y-k8vw-nudd
vulnerability_id VCID-6z8y-k8vw-nudd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800604
reference_id 800604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800604
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
reference_id CVE-2012-1142
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1142
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd
23
url VCID-73d5-ezt5-87eh
vulnerability_id VCID-73d5-ezt5-87eh
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9663
reference_id
reference_type
scores
0
value 0.02607
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-01T12:55:00Z
1
value 0.02607
scoring_system epss
scoring_elements 0.85571
published_at 2026-04-02T12:55:00Z
2
value 0.02607
scoring_system epss
scoring_elements 0.85588
published_at 2026-04-04T12:55:00Z
3
value 0.02607
scoring_system epss
scoring_elements 0.85593
published_at 2026-04-07T12:55:00Z
4
value 0.02607
scoring_system epss
scoring_elements 0.85612
published_at 2026-04-08T12:55:00Z
5
value 0.02607
scoring_system epss
scoring_elements 0.85624
published_at 2026-04-09T12:55:00Z
6
value 0.02607
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-11T12:55:00Z
7
value 0.02607
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-12T12:55:00Z
8
value 0.02607
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-13T12:55:00Z
9
value 0.02607
scoring_system epss
scoring_elements 0.85653
published_at 2026-04-16T12:55:00Z
10
value 0.02607
scoring_system epss
scoring_elements 0.85658
published_at 2026-04-18T12:55:00Z
11
value 0.02607
scoring_system epss
scoring_elements 0.85654
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191085
reference_id 1191085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191085
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9663
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh
24
url VCID-73e1-scax-8ugj
vulnerability_id VCID-73e1-scax-8ugj
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9675
reference_id
reference_type
scores
0
value 0.02114
scoring_system epss
scoring_elements 0.8405
published_at 2026-04-01T12:55:00Z
1
value 0.02114
scoring_system epss
scoring_elements 0.84063
published_at 2026-04-02T12:55:00Z
2
value 0.02114
scoring_system epss
scoring_elements 0.8408
published_at 2026-04-04T12:55:00Z
3
value 0.02114
scoring_system epss
scoring_elements 0.84082
published_at 2026-04-07T12:55:00Z
4
value 0.02114
scoring_system epss
scoring_elements 0.84105
published_at 2026-04-08T12:55:00Z
5
value 0.02114
scoring_system epss
scoring_elements 0.84111
published_at 2026-04-09T12:55:00Z
6
value 0.02114
scoring_system epss
scoring_elements 0.84129
published_at 2026-04-11T12:55:00Z
7
value 0.02114
scoring_system epss
scoring_elements 0.84123
published_at 2026-04-12T12:55:00Z
8
value 0.02114
scoring_system epss
scoring_elements 0.84119
published_at 2026-04-13T12:55:00Z
9
value 0.02114
scoring_system epss
scoring_elements 0.84141
published_at 2026-04-16T12:55:00Z
10
value 0.02114
scoring_system epss
scoring_elements 0.84142
published_at 2026-04-18T12:55:00Z
11
value 0.02114
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9675
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191192
reference_id 1191192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191192
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9675
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj
25
url VCID-7698-fwj1-fufd
vulnerability_id VCID-7698-fwj1-fufd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
reference_id
reference_type
scores
0
value 0.03648
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-21T12:55:00Z
1
value 0.03648
scoring_system epss
scoring_elements 0.8788
published_at 2026-04-16T12:55:00Z
2
value 0.03648
scoring_system epss
scoring_elements 0.87879
published_at 2026-04-18T12:55:00Z
3
value 0.03648
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-02T12:55:00Z
4
value 0.03648
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-04T12:55:00Z
5
value 0.03648
scoring_system epss
scoring_elements 0.87835
published_at 2026-04-07T12:55:00Z
6
value 0.03648
scoring_system epss
scoring_elements 0.87856
published_at 2026-04-08T12:55:00Z
7
value 0.03648
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-09T12:55:00Z
8
value 0.03648
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-11T12:55:00Z
9
value 0.03648
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-12T12:55:00Z
10
value 0.03648
scoring_system epss
scoring_elements 0.87866
published_at 2026-04-13T12:55:00Z
11
value 0.04785
scoring_system epss
scoring_elements 0.89433
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
4
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
5
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
6
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
7
reference_url http://www.debian.org/security/2010/dsa-2116
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2116
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
10
reference_url http://www.securityfocus.com/bid/43700
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43700
11
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=623625
reference_id 623625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=623625
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
reference_id CVE-2010-3311
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
43
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
44
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
45
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
46
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
47
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3311
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd
26
url VCID-79js-ywyp-x3au
vulnerability_id VCID-79js-ywyp-x3au
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0226
reference_id
reference_type
scores
0
value 0.10653
scoring_system epss
scoring_elements 0.93274
published_at 2026-04-01T12:55:00Z
1
value 0.10653
scoring_system epss
scoring_elements 0.93283
published_at 2026-04-02T12:55:00Z
2
value 0.10653
scoring_system epss
scoring_elements 0.93289
published_at 2026-04-04T12:55:00Z
3
value 0.10653
scoring_system epss
scoring_elements 0.93288
published_at 2026-04-07T12:55:00Z
4
value 0.10653
scoring_system epss
scoring_elements 0.93296
published_at 2026-04-08T12:55:00Z
5
value 0.10653
scoring_system epss
scoring_elements 0.93301
published_at 2026-04-09T12:55:00Z
6
value 0.10653
scoring_system epss
scoring_elements 0.93305
published_at 2026-04-11T12:55:00Z
7
value 0.10653
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-12T12:55:00Z
8
value 0.10653
scoring_system epss
scoring_elements 0.93304
published_at 2026-04-13T12:55:00Z
9
value 0.10653
scoring_system epss
scoring_elements 0.93322
published_at 2026-04-16T12:55:00Z
10
value 0.10653
scoring_system epss
scoring_elements 0.93327
published_at 2026-04-18T12:55:00Z
11
value 0.10653
scoring_system epss
scoring_elements 0.93334
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871
reference_id 635871
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=722701
reference_id 722701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=722701
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1085
reference_id RHSA-2011:1085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1085
7
reference_url https://usn.ubuntu.com/1173-1/
reference_id USN-1173-1
reference_type
scores
url https://usn.ubuntu.com/1173-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-0226
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au
27
url VCID-7jyc-psvy-hkgh
vulnerability_id VCID-7jyc-psvy-hkgh
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2661
reference_id
reference_type
scores
0
value 0.12644
scoring_system epss
scoring_elements 0.93937
published_at 2026-04-01T12:55:00Z
1
value 0.12644
scoring_system epss
scoring_elements 0.93946
published_at 2026-04-02T12:55:00Z
2
value 0.12644
scoring_system epss
scoring_elements 0.93955
published_at 2026-04-04T12:55:00Z
3
value 0.12644
scoring_system epss
scoring_elements 0.93958
published_at 2026-04-07T12:55:00Z
4
value 0.12644
scoring_system epss
scoring_elements 0.93966
published_at 2026-04-08T12:55:00Z
5
value 0.12644
scoring_system epss
scoring_elements 0.9397
published_at 2026-04-09T12:55:00Z
6
value 0.12644
scoring_system epss
scoring_elements 0.93973
published_at 2026-04-13T12:55:00Z
7
value 0.12644
scoring_system epss
scoring_elements 0.93988
published_at 2026-04-16T12:55:00Z
8
value 0.12644
scoring_system epss
scoring_elements 0.93994
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618110
reference_id 1618110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618110
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt
reference_id CVE-2006-2661;OSVDB-26033
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt
5
reference_url https://www.securityfocus.com/bid/18329/info
reference_id CVE-2006-2661;OSVDB-26033
reference_type exploit
scores
url https://www.securityfocus.com/bid/18329/info
6
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
7
reference_url https://usn.ubuntu.com/291-1/
reference_id USN-291-1
reference_type
scores
url https://usn.ubuntu.com/291-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.2.1-1?distro=trixie
purl pkg:deb/debian/freetype@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-2661
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyc-psvy-hkgh
28
url VCID-92gd-8jxd-qbbg
vulnerability_id VCID-92gd-8jxd-qbbg
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7864.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7864.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7864
reference_id
reference_type
scores
0
value 0.02062
scoring_system epss
scoring_elements 0.83851
published_at 2026-04-01T12:55:00Z
1
value 0.02062
scoring_system epss
scoring_elements 0.83944
published_at 2026-04-21T12:55:00Z
2
value 0.02062
scoring_system epss
scoring_elements 0.83912
published_at 2026-04-09T12:55:00Z
3
value 0.02062
scoring_system epss
scoring_elements 0.83928
published_at 2026-04-11T12:55:00Z
4
value 0.02062
scoring_system epss
scoring_elements 0.83923
published_at 2026-04-12T12:55:00Z
5
value 0.02062
scoring_system epss
scoring_elements 0.83919
published_at 2026-04-13T12:55:00Z
6
value 0.02062
scoring_system epss
scoring_elements 0.83865
published_at 2026-04-02T12:55:00Z
7
value 0.02062
scoring_system epss
scoring_elements 0.8388
published_at 2026-04-04T12:55:00Z
8
value 0.02062
scoring_system epss
scoring_elements 0.83882
published_at 2026-04-07T12:55:00Z
9
value 0.02062
scoring_system epss
scoring_elements 0.83905
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7864
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=509
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=509
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
6
reference_url http://www.securityfocus.com/bid/97673
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97673
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444911
reference_id 1444911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444911
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7864
reference_id CVE-2017-7864
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7864
10
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
fixed_packages
0
url pkg:deb/debian/freetype@0?distro=trixie
purl pkg:deb/debian/freetype@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-7864
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92gd-8jxd-qbbg
29
url VCID-a9r6-k8gp-nbfs
vulnerability_id VCID-a9r6-k8gp-nbfs
summary freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
reference_id
reference_type
scores
0
value 0.02734
scoring_system epss
scoring_elements 0.85895
published_at 2026-04-01T12:55:00Z
1
value 0.02734
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-21T12:55:00Z
2
value 0.02734
scoring_system epss
scoring_elements 0.85961
published_at 2026-04-13T12:55:00Z
3
value 0.02734
scoring_system epss
scoring_elements 0.8598
published_at 2026-04-16T12:55:00Z
4
value 0.02734
scoring_system epss
scoring_elements 0.85984
published_at 2026-04-18T12:55:00Z
5
value 0.02734
scoring_system epss
scoring_elements 0.85906
published_at 2026-04-02T12:55:00Z
6
value 0.02734
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-04T12:55:00Z
7
value 0.02734
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-07T12:55:00Z
8
value 0.02734
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-08T12:55:00Z
9
value 0.02734
scoring_system epss
scoring_elements 0.85954
published_at 2026-04-09T12:55:00Z
10
value 0.02734
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-11T12:55:00Z
11
value 0.02734
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?46346
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?46346
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
reference_id 1763613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
reference_id CVE-2015-9383
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
14
reference_url https://usn.ubuntu.com/4126-1/
reference_id USN-4126-1
reference_type
scores
url https://usn.ubuntu.com/4126-1/
15
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-1?distro=trixie
purl pkg:deb/debian/freetype@2.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-9383
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs
30
url VCID-ahxa-yjxp-a7en
vulnerability_id VCID-ahxa-yjxp-a7en
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
reference_id
reference_type
scores
0
value 0.03379
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-21T12:55:00Z
1
value 0.03379
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-01T12:55:00Z
2
value 0.03379
scoring_system epss
scoring_elements 0.8734
published_at 2026-04-02T12:55:00Z
3
value 0.03379
scoring_system epss
scoring_elements 0.87355
published_at 2026-04-04T12:55:00Z
4
value 0.03379
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-07T12:55:00Z
5
value 0.03379
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-08T12:55:00Z
6
value 0.03379
scoring_system epss
scoring_elements 0.87381
published_at 2026-04-09T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-11T12:55:00Z
8
value 0.03379
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-12T12:55:00Z
9
value 0.03379
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-13T12:55:00Z
10
value 0.03379
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-16T12:55:00Z
11
value 0.03379
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30248
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30248
12
reference_url https://savannah.nongnu.org/bugs/?30249
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30249
13
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
14
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
17
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613162
reference_id 613162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613162
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
reference_id CVE-2010-2499
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
28
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2499
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en
31
url VCID-ask2-xeb7-7qbk
vulnerability_id VCID-ask2-xeb7-7qbk
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9671
reference_id
reference_type
scores
0
value 0.03218
scoring_system epss
scoring_elements 0.86989
published_at 2026-04-01T12:55:00Z
1
value 0.03218
scoring_system epss
scoring_elements 0.87
published_at 2026-04-02T12:55:00Z
2
value 0.03218
scoring_system epss
scoring_elements 0.87019
published_at 2026-04-04T12:55:00Z
3
value 0.03218
scoring_system epss
scoring_elements 0.87012
published_at 2026-04-07T12:55:00Z
4
value 0.03218
scoring_system epss
scoring_elements 0.87032
published_at 2026-04-08T12:55:00Z
5
value 0.03218
scoring_system epss
scoring_elements 0.8704
published_at 2026-04-09T12:55:00Z
6
value 0.03218
scoring_system epss
scoring_elements 0.87053
published_at 2026-04-11T12:55:00Z
7
value 0.03218
scoring_system epss
scoring_elements 0.87048
published_at 2026-04-12T12:55:00Z
8
value 0.03218
scoring_system epss
scoring_elements 0.87042
published_at 2026-04-13T12:55:00Z
9
value 0.03218
scoring_system epss
scoring_elements 0.87058
published_at 2026-04-21T12:55:00Z
10
value 0.03218
scoring_system epss
scoring_elements 0.87062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191094
reference_id 1191094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191094
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9671
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk
32
url VCID-b35u-t7u2-sudy
vulnerability_id VCID-b35u-t7u2-sudy
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
reference_id
reference_type
scores
0
value 0.00842
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-21T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74764
published_at 2026-04-16T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74771
published_at 2026-04-18T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74684
published_at 2026-04-01T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-07T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74714
published_at 2026-04-04T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.7472
published_at 2026-04-08T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.74734
published_at 2026-04-09T12:55:00Z
8
value 0.00842
scoring_system epss
scoring_elements 0.74757
published_at 2026-04-11T12:55:00Z
9
value 0.00842
scoring_system epss
scoring_elements 0.74736
published_at 2026-04-12T12:55:00Z
10
value 0.00842
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
reference_id CVE-2014-9746
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
fixed_packages
0
url pkg:deb/debian/freetype@2.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9746
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy
33
url VCID-bt31-xk8r-8qd2
vulnerability_id VCID-bt31-xk8r-8qd2
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
reference_id
reference_type
scores
0
value 0.02089
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-21T12:55:00Z
1
value 0.02089
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-01T12:55:00Z
2
value 0.02089
scoring_system epss
scoring_elements 0.83968
published_at 2026-04-02T12:55:00Z
3
value 0.02089
scoring_system epss
scoring_elements 0.83983
published_at 2026-04-04T12:55:00Z
4
value 0.02089
scoring_system epss
scoring_elements 0.83987
published_at 2026-04-07T12:55:00Z
5
value 0.02089
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-08T12:55:00Z
6
value 0.02089
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-09T12:55:00Z
7
value 0.02089
scoring_system epss
scoring_elements 0.84033
published_at 2026-04-11T12:55:00Z
8
value 0.02089
scoring_system epss
scoring_elements 0.84026
published_at 2026-04-12T12:55:00Z
9
value 0.02089
scoring_system epss
scoring_elements 0.84022
published_at 2026-04-13T12:55:00Z
10
value 0.02089
scoring_system epss
scoring_elements 0.84046
published_at 2026-04-16T12:55:00Z
11
value 0.02089
scoring_system epss
scoring_elements 0.84047
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30082
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30082
10
reference_url https://savannah.nongnu.org/bugs/?30083
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30083
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613154
reference_id 613154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613154
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
reference_id CVE-2010-2497
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
19
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2497
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2
34
url VCID-cvba-wjra-wye9
vulnerability_id VCID-cvba-wjra-wye9
summary
Multiple vulnerabilities in FreeType might result in the remote execution
    of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1861
reference_id
reference_type
scores
0
value 0.08522
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-01T12:55:00Z
1
value 0.08522
scoring_system epss
scoring_elements 0.9235
published_at 2026-04-02T12:55:00Z
2
value 0.08522
scoring_system epss
scoring_elements 0.92356
published_at 2026-04-04T12:55:00Z
3
value 0.08522
scoring_system epss
scoring_elements 0.9236
published_at 2026-04-07T12:55:00Z
4
value 0.08522
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-08T12:55:00Z
5
value 0.08522
scoring_system epss
scoring_elements 0.92376
published_at 2026-04-09T12:55:00Z
6
value 0.08522
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-13T12:55:00Z
7
value 0.08522
scoring_system epss
scoring_elements 0.92384
published_at 2026-04-12T12:55:00Z
8
value 0.08522
scoring_system epss
scoring_elements 0.92394
published_at 2026-04-16T12:55:00Z
9
value 0.08522
scoring_system epss
scoring_elements 0.92393
published_at 2026-04-18T12:55:00Z
10
value 0.08522
scoring_system epss
scoring_elements 0.92395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=484437
reference_id 484437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=484437
4
reference_url https://security.gentoo.org/glsa/200607-02
reference_id GLSA-200607-02
reference_type
scores
url https://security.gentoo.org/glsa/200607-02
5
reference_url https://security.gentoo.org/glsa/200710-09
reference_id GLSA-200710-09
reference_type
scores
url https://security.gentoo.org/glsa/200710-09
6
reference_url https://security.gentoo.org/glsa/201006-01
reference_id GLSA-201006-01
reference_type
scores
url https://security.gentoo.org/glsa/201006-01
7
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
8
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
9
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
10
reference_url https://usn.ubuntu.com/291-1/
reference_id USN-291-1
reference_type
scores
url https://usn.ubuntu.com/291-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.2.1-1?distro=trixie
purl pkg:deb/debian/freetype@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-1861
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvba-wjra-wye9
35
url VCID-cwfg-1d6f-hfgg
vulnerability_id VCID-cwfg-1d6f-hfgg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128110167119337&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128110167119337&w=2
5
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
reference_id
reference_type
scores
0
value 0.07802
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-21T12:55:00Z
1
value 0.07802
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-01T12:55:00Z
2
value 0.07802
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-02T12:55:00Z
3
value 0.07802
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-04T12:55:00Z
4
value 0.07802
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-07T12:55:00Z
5
value 0.07802
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-08T12:55:00Z
6
value 0.07802
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-09T12:55:00Z
7
value 0.07802
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-11T12:55:00Z
8
value 0.07802
scoring_system epss
scoring_elements 0.91979
published_at 2026-04-12T12:55:00Z
9
value 0.07802
scoring_system epss
scoring_elements 0.91976
published_at 2026-04-13T12:55:00Z
10
value 0.07802
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-16T12:55:00Z
11
value 0.07802
scoring_system epss
scoring_elements 0.91993
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
10
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
11
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
12
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
13
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30658
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30658
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621907
reference_id 621907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621907
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
reference_id CVE-2010-2808
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
40
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
41
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2808
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg
36
url VCID-d2v4-gm58-uyby
vulnerability_id VCID-d2v4-gm58-uyby
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800600
reference_id 800600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
reference_id CVE-2012-1140
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1140
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby
37
url VCID-dcxj-zzfj-3bg7
vulnerability_id VCID-dcxj-zzfj-3bg7
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35967
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35996
published_at 2026-04-04T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35878
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35901
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35865
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35842
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35869
published_at 2026-04-18T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
reference_id 2077985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5453-1/
reference_id USN-5453-1
reference_type
scores
url https://usn.ubuntu.com/5453-1/
11
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
12
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-27406
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7
38
url VCID-edag-8pt8-jqdw
vulnerability_id VCID-edag-8pt8-jqdw
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800595
reference_id 800595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
reference_id CVE-2012-1137
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1137
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw
39
url VCID-ettc-tamy-kfcf
vulnerability_id VCID-ettc-tamy-kfcf
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800591
reference_id 800591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800591
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
reference_id CVE-2012-1133
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1133
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf
40
url VCID-ewj8-a9c8-w3dy
vulnerability_id VCID-ewj8-a9c8-w3dy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800593
reference_id 800593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800593
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
reference_id CVE-2012-1135
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1135
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy
41
url VCID-f9ym-em5n-87ep
vulnerability_id VCID-f9ym-em5n-87ep
summary
Multiple integer overflows in FreeType might allow for the remote execution
    of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
reference_id
reference_type
scores
0
value 0.16376
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-01T12:55:00Z
1
value 0.16376
scoring_system epss
scoring_elements 0.94836
published_at 2026-04-02T12:55:00Z
2
value 0.16376
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-04T12:55:00Z
3
value 0.16376
scoring_system epss
scoring_elements 0.94842
published_at 2026-04-07T12:55:00Z
4
value 0.16376
scoring_system epss
scoring_elements 0.94851
published_at 2026-04-08T12:55:00Z
5
value 0.16376
scoring_system epss
scoring_elements 0.94856
published_at 2026-04-09T12:55:00Z
6
value 0.16376
scoring_system epss
scoring_elements 0.9486
published_at 2026-04-11T12:55:00Z
7
value 0.16376
scoring_system epss
scoring_elements 0.94863
published_at 2026-04-12T12:55:00Z
8
value 0.16376
scoring_system epss
scoring_elements 0.94864
published_at 2026-04-13T12:55:00Z
9
value 0.16376
scoring_system epss
scoring_elements 0.94872
published_at 2026-04-16T12:55:00Z
10
value 0.16376
scoring_system epss
scoring_elements 0.94875
published_at 2026-04-18T12:55:00Z
11
value 0.16376
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491384
reference_id 491384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491384
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
reference_id 524925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
5
reference_url https://security.gentoo.org/glsa/200905-05
reference_id GLSA-200905-05
reference_type
scores
url https://security.gentoo.org/glsa/200905-05
6
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
7
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
8
reference_url https://access.redhat.com/errata/RHSA-2009:1061
reference_id RHSA-2009:1061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1061
9
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
10
reference_url https://usn.ubuntu.com/767-1/
reference_id USN-767-1
reference_type
scores
url https://usn.ubuntu.com/767-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.3.9-4.1?distro=trixie
purl pkg:deb/debian/freetype@2.3.9-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.9-4.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-0946
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep
42
url VCID-fp2p-5ymf-wffj
vulnerability_id VCID-fp2p-5ymf-wffj
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9669
reference_id
reference_type
scores
0
value 0.02443
scoring_system epss
scoring_elements 0.8511
published_at 2026-04-01T12:55:00Z
1
value 0.02443
scoring_system epss
scoring_elements 0.85123
published_at 2026-04-02T12:55:00Z
2
value 0.02443
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-04T12:55:00Z
3
value 0.02443
scoring_system epss
scoring_elements 0.85144
published_at 2026-04-07T12:55:00Z
4
value 0.02443
scoring_system epss
scoring_elements 0.85166
published_at 2026-04-08T12:55:00Z
5
value 0.02443
scoring_system epss
scoring_elements 0.85174
published_at 2026-04-09T12:55:00Z
6
value 0.02443
scoring_system epss
scoring_elements 0.85188
published_at 2026-04-11T12:55:00Z
7
value 0.02443
scoring_system epss
scoring_elements 0.85186
published_at 2026-04-12T12:55:00Z
8
value 0.02443
scoring_system epss
scoring_elements 0.85183
published_at 2026-04-13T12:55:00Z
9
value 0.02443
scoring_system epss
scoring_elements 0.85204
published_at 2026-04-21T12:55:00Z
10
value 0.02443
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9669
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191092
reference_id 1191092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191092
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9669
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj
43
url VCID-gcht-dzky-fbay
vulnerability_id VCID-gcht-dzky-fbay
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
reference_id
reference_type
scores
0
value 0.03893
scoring_system epss
scoring_elements 0.88275
published_at 2026-04-21T12:55:00Z
1
value 0.03893
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-01T12:55:00Z
2
value 0.03893
scoring_system epss
scoring_elements 0.88214
published_at 2026-04-02T12:55:00Z
3
value 0.03893
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-04T12:55:00Z
4
value 0.03893
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-07T12:55:00Z
5
value 0.03893
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-08T12:55:00Z
6
value 0.03893
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-09T12:55:00Z
7
value 0.03893
scoring_system epss
scoring_elements 0.88272
published_at 2026-04-11T12:55:00Z
8
value 0.03893
scoring_system epss
scoring_elements 0.88264
published_at 2026-04-12T12:55:00Z
9
value 0.03893
scoring_system epss
scoring_elements 0.88263
published_at 2026-04-13T12:55:00Z
10
value 0.03893
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-16T12:55:00Z
11
value 0.03893
scoring_system epss
scoring_elements 0.88276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
11
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
14
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
15
reference_url http://www.securityfocus.com/bid/42621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42621
16
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625632
reference_id 625632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625632
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
reference_id CVE-2010-3054
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
28
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3054
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay
44
url VCID-gcr7-xxtw-e3bs
vulnerability_id VCID-gcr7-xxtw-e3bs
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3256
reference_id
reference_type
scores
0
value 0.02511
scoring_system epss
scoring_elements 0.85299
published_at 2026-04-01T12:55:00Z
1
value 0.02511
scoring_system epss
scoring_elements 0.85311
published_at 2026-04-02T12:55:00Z
2
value 0.02511
scoring_system epss
scoring_elements 0.8533
published_at 2026-04-04T12:55:00Z
3
value 0.02511
scoring_system epss
scoring_elements 0.85331
published_at 2026-04-07T12:55:00Z
4
value 0.02511
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-08T12:55:00Z
5
value 0.02511
scoring_system epss
scoring_elements 0.85362
published_at 2026-04-09T12:55:00Z
6
value 0.02511
scoring_system epss
scoring_elements 0.85376
published_at 2026-04-11T12:55:00Z
7
value 0.02511
scoring_system epss
scoring_elements 0.85374
published_at 2026-04-12T12:55:00Z
8
value 0.02511
scoring_system epss
scoring_elements 0.85371
published_at 2026-04-13T12:55:00Z
9
value 0.03238
scoring_system epss
scoring_elements 0.87114
published_at 2026-04-21T12:55:00Z
10
value 0.03238
scoring_system epss
scoring_elements 0.87118
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3256
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120
reference_id 646120
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=746226
reference_id 746226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=746226
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1402
reference_id RHSA-2011:1402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1402
7
reference_url https://access.redhat.com/errata/RHSA-2012:0094
reference_id RHSA-2012:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0094
8
reference_url https://usn.ubuntu.com/1267-1/
reference_id USN-1267-1
reference_type
scores
url https://usn.ubuntu.com/1267-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.7-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.7-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-3256
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs
45
url VCID-gmk4-9sks-s3a5
vulnerability_id VCID-gmk4-9sks-s3a5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
reference_id
reference_type
scores
0
value 0.04292
scoring_system epss
scoring_elements 0.88809
published_at 2026-04-01T12:55:00Z
1
value 0.04292
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-04T12:55:00Z
2
value 0.04292
scoring_system epss
scoring_elements 0.88837
published_at 2026-04-07T12:55:00Z
3
value 0.04292
scoring_system epss
scoring_elements 0.88854
published_at 2026-04-08T12:55:00Z
4
value 0.04292
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-09T12:55:00Z
5
value 0.04292
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-11T12:55:00Z
6
value 0.04292
scoring_system epss
scoring_elements 0.88818
published_at 2026-04-02T12:55:00Z
7
value 0.04622
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-18T12:55:00Z
8
value 0.04622
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-21T12:55:00Z
9
value 0.04622
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-12T12:55:00Z
10
value 0.04622
scoring_system epss
scoring_elements 0.89269
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
3
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
5
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
6
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
7
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
8
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
11
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
12
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617342
reference_id 617342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617342
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
reference_id CVE-2010-2541
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
21
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
22
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
23
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
24
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2541
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5
46
url VCID-gtka-sbgw-tuf5
vulnerability_id VCID-gtka-sbgw-tuf5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9665
reference_id
reference_type
scores
0
value 0.04321
scoring_system epss
scoring_elements 0.88852
published_at 2026-04-01T12:55:00Z
1
value 0.04321
scoring_system epss
scoring_elements 0.8886
published_at 2026-04-02T12:55:00Z
2
value 0.04321
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-04T12:55:00Z
3
value 0.04321
scoring_system epss
scoring_elements 0.88878
published_at 2026-04-07T12:55:00Z
4
value 0.04321
scoring_system epss
scoring_elements 0.88896
published_at 2026-04-08T12:55:00Z
5
value 0.04321
scoring_system epss
scoring_elements 0.88902
published_at 2026-04-09T12:55:00Z
6
value 0.04321
scoring_system epss
scoring_elements 0.88913
published_at 2026-04-11T12:55:00Z
7
value 0.04321
scoring_system epss
scoring_elements 0.88908
published_at 2026-04-12T12:55:00Z
8
value 0.04321
scoring_system epss
scoring_elements 0.88907
published_at 2026-04-13T12:55:00Z
9
value 0.04321
scoring_system epss
scoring_elements 0.88921
published_at 2026-04-16T12:55:00Z
10
value 0.04321
scoring_system epss
scoring_elements 0.88919
published_at 2026-04-18T12:55:00Z
11
value 0.04321
scoring_system epss
scoring_elements 0.88915
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191087
reference_id 1191087
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191087
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9665
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5
47
url VCID-h7qy-dusf-tqb7
vulnerability_id VCID-h7qy-dusf-tqb7
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800602
reference_id 800602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
reference_id CVE-2012-1141
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1141
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7
48
url VCID-hgkz-p83z-ybfe
vulnerability_id VCID-hgkz-p83z-ybfe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800583
reference_id 800583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800583
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
reference_id CVE-2012-1127
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1127
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe
49
url VCID-hgm7-qrp2-c3g8
vulnerability_id VCID-hgm7-qrp2-c3g8
summary ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31782
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54411
published_at 2026-04-21T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54325
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54355
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.5433
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54382
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54426
published_at 2026-04-11T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54408
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54386
published_at 2026-04-13T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54425
published_at 2026-04-16T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31782
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-31782
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgm7-qrp2-c3g8
50
url VCID-hutw-rk7x-5bc3
vulnerability_id VCID-hutw-rk7x-5bc3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
reference_id
reference_type
scores
0
value 0.02361
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-07T12:55:00Z
1
value 0.02361
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-01T12:55:00Z
2
value 0.02361
scoring_system epss
scoring_elements 0.84869
published_at 2026-04-02T12:55:00Z
3
value 0.02361
scoring_system epss
scoring_elements 0.84887
published_at 2026-04-04T12:55:00Z
4
value 0.02908
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-12T12:55:00Z
5
value 0.02908
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-13T12:55:00Z
6
value 0.02908
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-16T12:55:00Z
7
value 0.02908
scoring_system epss
scoring_elements 0.86386
published_at 2026-04-18T12:55:00Z
8
value 0.02908
scoring_system epss
scoring_elements 0.8638
published_at 2026-04-21T12:55:00Z
9
value 0.02908
scoring_system epss
scoring_elements 0.86349
published_at 2026-04-08T12:55:00Z
10
value 0.02908
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-09T12:55:00Z
11
value 0.02908
scoring_system epss
scoring_elements 0.86373
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
reference_id 1262377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
reference_id 798620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
8
reference_url https://usn.ubuntu.com/2739-1/
reference_id USN-2739-1
reference_type
scores
url https://usn.ubuntu.com/2739-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9745
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3
51
url VCID-jg4p-nv1j-fyb9
vulnerability_id VCID-jg4p-nv1j-fyb9
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9670
reference_id
reference_type
scores
0
value 0.05048
scoring_system epss
scoring_elements 0.89729
published_at 2026-04-01T12:55:00Z
1
value 0.05048
scoring_system epss
scoring_elements 0.89732
published_at 2026-04-02T12:55:00Z
2
value 0.05048
scoring_system epss
scoring_elements 0.89746
published_at 2026-04-04T12:55:00Z
3
value 0.05048
scoring_system epss
scoring_elements 0.89748
published_at 2026-04-07T12:55:00Z
4
value 0.05048
scoring_system epss
scoring_elements 0.89765
published_at 2026-04-08T12:55:00Z
5
value 0.05048
scoring_system epss
scoring_elements 0.89772
published_at 2026-04-09T12:55:00Z
6
value 0.05048
scoring_system epss
scoring_elements 0.89778
published_at 2026-04-11T12:55:00Z
7
value 0.05048
scoring_system epss
scoring_elements 0.89777
published_at 2026-04-12T12:55:00Z
8
value 0.05048
scoring_system epss
scoring_elements 0.8977
published_at 2026-04-13T12:55:00Z
9
value 0.05048
scoring_system epss
scoring_elements 0.89786
published_at 2026-04-18T12:55:00Z
10
value 0.05048
scoring_system epss
scoring_elements 0.8978
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191093
reference_id 1191093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191093
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9670
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9
52
url VCID-jn9w-2axj-8ke5
vulnerability_id VCID-jn9w-2axj-8ke5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9659
reference_id
reference_type
scores
0
value 0.02866
scoring_system epss
scoring_elements 0.86198
published_at 2026-04-01T12:55:00Z
1
value 0.02866
scoring_system epss
scoring_elements 0.86208
published_at 2026-04-02T12:55:00Z
2
value 0.02866
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-04T12:55:00Z
3
value 0.02866
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-07T12:55:00Z
4
value 0.02866
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
5
value 0.02866
scoring_system epss
scoring_elements 0.86252
published_at 2026-04-09T12:55:00Z
6
value 0.02866
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-11T12:55:00Z
7
value 0.02866
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
8
value 0.02866
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
9
value 0.02866
scoring_system epss
scoring_elements 0.86275
published_at 2026-04-16T12:55:00Z
10
value 0.02866
scoring_system epss
scoring_elements 0.8628
published_at 2026-04-18T12:55:00Z
11
value 0.02866
scoring_system epss
scoring_elements 0.86273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191081
reference_id 1191081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191081
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084
reference_id 773084
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9659
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5
53
url VCID-jwbe-5wmu-uqgp
vulnerability_id VCID-jwbe-5wmu-uqgp
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800589
reference_id 800589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800589
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
reference_id CVE-2012-1131
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1131
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp
54
url VCID-k8ba-gmc8-qfc4
vulnerability_id VCID-k8ba-gmc8-qfc4
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7858.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7858.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7858
reference_id
reference_type
scores
0
value 0.02409
scoring_system epss
scoring_elements 0.85016
published_at 2026-04-01T12:55:00Z
1
value 0.02409
scoring_system epss
scoring_elements 0.85114
published_at 2026-04-18T12:55:00Z
2
value 0.02409
scoring_system epss
scoring_elements 0.85093
published_at 2026-04-12T12:55:00Z
3
value 0.02409
scoring_system epss
scoring_elements 0.8509
published_at 2026-04-13T12:55:00Z
4
value 0.02409
scoring_system epss
scoring_elements 0.85111
published_at 2026-04-21T12:55:00Z
5
value 0.02409
scoring_system epss
scoring_elements 0.85028
published_at 2026-04-02T12:55:00Z
6
value 0.02409
scoring_system epss
scoring_elements 0.85045
published_at 2026-04-04T12:55:00Z
7
value 0.02409
scoring_system epss
scoring_elements 0.8505
published_at 2026-04-07T12:55:00Z
8
value 0.02409
scoring_system epss
scoring_elements 0.85072
published_at 2026-04-08T12:55:00Z
9
value 0.02409
scoring_system epss
scoring_elements 0.85079
published_at 2026-04-09T12:55:00Z
10
value 0.02409
scoring_system epss
scoring_elements 0.85095
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7858
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
6
reference_url http://www.securityfocus.com/bid/97682
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97682
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444904
reference_id 1444904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444904
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7858
reference_id CVE-2017-7858
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7858
10
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
fixed_packages
0
url pkg:deb/debian/freetype@0?distro=trixie
purl pkg:deb/debian/freetype@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-7858
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8ba-gmc8-qfc4
55
url VCID-kdfa-8q7m-2kbk
vulnerability_id VCID-kdfa-8q7m-2kbk
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0747
reference_id
reference_type
scores
0
value 0.45933
scoring_system epss
scoring_elements 0.97606
published_at 2026-04-01T12:55:00Z
1
value 0.45933
scoring_system epss
scoring_elements 0.97612
published_at 2026-04-02T12:55:00Z
2
value 0.45933
scoring_system epss
scoring_elements 0.97615
published_at 2026-04-04T12:55:00Z
3
value 0.45933
scoring_system epss
scoring_elements 0.97616
published_at 2026-04-07T12:55:00Z
4
value 0.45933
scoring_system epss
scoring_elements 0.97621
published_at 2026-04-08T12:55:00Z
5
value 0.45933
scoring_system epss
scoring_elements 0.97623
published_at 2026-04-09T12:55:00Z
6
value 0.45933
scoring_system epss
scoring_elements 0.97626
published_at 2026-04-11T12:55:00Z
7
value 0.45933
scoring_system epss
scoring_elements 0.97628
published_at 2026-04-12T12:55:00Z
8
value 0.45933
scoring_system epss
scoring_elements 0.97629
published_at 2026-04-13T12:55:00Z
9
value 0.45933
scoring_system epss
scoring_elements 0.97636
published_at 2026-04-16T12:55:00Z
10
value 0.45933
scoring_system epss
scoring_elements 0.97639
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618019
reference_id 1618019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618019
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt
reference_id CVE-2006-0747;OSVDB-26032
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt
5
reference_url https://www.securityfocus.com/bid/18326/info
reference_id CVE-2006-0747;OSVDB-26032
reference_type exploit
scores
url https://www.securityfocus.com/bid/18326/info
6
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
7
reference_url https://usn.ubuntu.com/291-1/
reference_id USN-291-1
reference_type
scores
url https://usn.ubuntu.com/291-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.2.1-1?distro=trixie
purl pkg:deb/debian/freetype@2.2.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-0747
risk_score 0.8
exploitability 2.0
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdfa-8q7m-2kbk
56
url VCID-m8ha-zxb7-tyg6
vulnerability_id VCID-m8ha-zxb7-tyg6
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
reference_id
reference_type
scores
0
value 0.01616
scoring_system epss
scoring_elements 0.81728
published_at 2026-04-01T12:55:00Z
1
value 0.01616
scoring_system epss
scoring_elements 0.81834
published_at 2026-04-21T12:55:00Z
2
value 0.01616
scoring_system epss
scoring_elements 0.81786
published_at 2026-04-08T12:55:00Z
3
value 0.01616
scoring_system epss
scoring_elements 0.81792
published_at 2026-04-09T12:55:00Z
4
value 0.01616
scoring_system epss
scoring_elements 0.81811
published_at 2026-04-11T12:55:00Z
5
value 0.01616
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-12T12:55:00Z
6
value 0.01616
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-13T12:55:00Z
7
value 0.01616
scoring_system epss
scoring_elements 0.81831
published_at 2026-04-18T12:55:00Z
8
value 0.01616
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-02T12:55:00Z
9
value 0.01616
scoring_system epss
scoring_elements 0.81762
published_at 2026-04-04T12:55:00Z
10
value 0.01616
scoring_system epss
scoring_elements 0.8176
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99093
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
reference_id 1446500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
reference_id 861220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
reference_id CVE-2017-8105
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
21
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
22
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
23
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie
purl pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-8105
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6
57
url VCID-mv93-73qb-ekgt
vulnerability_id VCID-mv93-73qb-ekgt
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800590
reference_id 800590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
reference_id CVE-2012-1132
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1132
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt
58
url VCID-n99m-fgj7-y3bk
vulnerability_id VCID-n99m-fgj7-y3bk
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800597
reference_id 800597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800597
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
reference_id CVE-2012-1138
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1138
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk
59
url VCID-nakp-vmxa-akey
vulnerability_id VCID-nakp-vmxa-akey
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9664
reference_id
reference_type
scores
0
value 0.01153
scoring_system epss
scoring_elements 0.78458
published_at 2026-04-01T12:55:00Z
1
value 0.01153
scoring_system epss
scoring_elements 0.78464
published_at 2026-04-02T12:55:00Z
2
value 0.01153
scoring_system epss
scoring_elements 0.78494
published_at 2026-04-04T12:55:00Z
3
value 0.01153
scoring_system epss
scoring_elements 0.78478
published_at 2026-04-07T12:55:00Z
4
value 0.01153
scoring_system epss
scoring_elements 0.78504
published_at 2026-04-08T12:55:00Z
5
value 0.01153
scoring_system epss
scoring_elements 0.7851
published_at 2026-04-09T12:55:00Z
6
value 0.01153
scoring_system epss
scoring_elements 0.78535
published_at 2026-04-11T12:55:00Z
7
value 0.01153
scoring_system epss
scoring_elements 0.78516
published_at 2026-04-12T12:55:00Z
8
value 0.01153
scoring_system epss
scoring_elements 0.78509
published_at 2026-04-13T12:55:00Z
9
value 0.01153
scoring_system epss
scoring_elements 0.78537
published_at 2026-04-16T12:55:00Z
10
value 0.01153
scoring_system epss
scoring_elements 0.78536
published_at 2026-04-18T12:55:00Z
11
value 0.01153
scoring_system epss
scoring_elements 0.78533
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191086
reference_id 1191086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191086
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9664
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey
60
url VCID-nfp7-sjcv-wkfv
vulnerability_id VCID-nfp7-sjcv-wkfv
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9668
reference_id
reference_type
scores
0
value 0.01723
scoring_system epss
scoring_elements 0.82336
published_at 2026-04-01T12:55:00Z
1
value 0.01723
scoring_system epss
scoring_elements 0.8235
published_at 2026-04-02T12:55:00Z
2
value 0.01723
scoring_system epss
scoring_elements 0.82368
published_at 2026-04-04T12:55:00Z
3
value 0.01723
scoring_system epss
scoring_elements 0.82363
published_at 2026-04-07T12:55:00Z
4
value 0.01723
scoring_system epss
scoring_elements 0.82391
published_at 2026-04-08T12:55:00Z
5
value 0.01723
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-09T12:55:00Z
6
value 0.01723
scoring_system epss
scoring_elements 0.82418
published_at 2026-04-11T12:55:00Z
7
value 0.01723
scoring_system epss
scoring_elements 0.82414
published_at 2026-04-12T12:55:00Z
8
value 0.01723
scoring_system epss
scoring_elements 0.82409
published_at 2026-04-13T12:55:00Z
9
value 0.01723
scoring_system epss
scoring_elements 0.82444
published_at 2026-04-16T12:55:00Z
10
value 0.01723
scoring_system epss
scoring_elements 0.82445
published_at 2026-04-18T12:55:00Z
11
value 0.01723
scoring_system epss
scoring_elements 0.82449
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9668
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191091
reference_id 1191091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191091
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
5
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
6
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9668
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv
61
url VCID-nn4w-gq71-kfgd
vulnerability_id VCID-nn4w-gq71-kfgd
summary freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65886
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65927
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65958
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65924
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.66006
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65993
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65962
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65997
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66011
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.65999
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
reference_id 1741802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
fixed_packages
0
url pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
purl pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-9290
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd
62
url VCID-nx21-ks3v-53e4
vulnerability_id VCID-nx21-ks3v-53e4
summary
Heap buffer overflow in CefSharp
### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.

> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ 

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

### Patches
Upgrade to 85.3.130 or higher

### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942

To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
reference_id
reference_type
scores
0
value 0.92905
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-16T12:55:00Z
1
value 0.92905
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-21T12:55:00Z
2
value 0.92905
scoring_system epss
scoring_elements 0.99771
published_at 2026-04-12T12:55:00Z
3
value 0.92931
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-04T12:55:00Z
4
value 0.92931
scoring_system epss
scoring_elements 0.99774
published_at 2026-04-08T12:55:00Z
5
value 0.92931
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
3
reference_url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
4
reference_url https://crbug.com/1139963
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://crbug.com/1139963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
145
reference_url http://seclists.org/fulldisclosure/2020/Nov/33
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://seclists.org/fulldisclosure/2020/Nov/33
146
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
147
reference_url https://github.com/cefsharp/CefSharp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp
148
reference_url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
149
reference_url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
152
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
153
reference_url https://security.gentoo.org/glsa/202011-12
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202011-12
154
reference_url https://security.gentoo.org/glsa/202012-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202012-04
155
reference_url https://security.gentoo.org/glsa/202401-19
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202401-19
156
reference_url https://security.netapp.com/advisory/ntap-20240812-0001
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240812-0001
157
reference_url https://www.debian.org/security/2021/dsa-4824
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://www.debian.org/security/2021/dsa-4824
158
reference_url https://www.nuget.org/packages/CefSharp.Common
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Common
159
reference_url https://www.nuget.org/packages/CefSharp.WinForms
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.WinForms
160
reference_url https://www.nuget.org/packages/CefSharp.Wpf
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf
161
reference_url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
162
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
reference_id 1890210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
163
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
reference_id 972586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
164
reference_url https://security.archlinux.org/ASA-202010-10
reference_id ASA-202010-10
reference_type
scores
url https://security.archlinux.org/ASA-202010-10
165
reference_url https://security.archlinux.org/ASA-202010-11
reference_id ASA-202010-11
reference_type
scores
url https://security.archlinux.org/ASA-202010-11
166
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
167
reference_url https://security.archlinux.org/AVG-1254
reference_id AVG-1254
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1254
168
reference_url https://security.archlinux.org/AVG-1255
reference_id AVG-1255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1255
169
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
170
reference_url https://github.com/advisories/GHSA-pv36-h7jh-qm62
reference_id GHSA-pv36-h7jh-qm62
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv36-h7jh-qm62
171
reference_url https://security.gentoo.org/glsa/202010-07
reference_id GLSA-202010-07
reference_type
scores
url https://security.gentoo.org/glsa/202010-07
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
reference_id J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
173
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
174
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
175
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
176
reference_url https://access.redhat.com/errata/RHSA-2020:4351
reference_id RHSA-2020:4351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4351
177
reference_url https://access.redhat.com/errata/RHSA-2020:4907
reference_id RHSA-2020:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4907
178
reference_url https://access.redhat.com/errata/RHSA-2020:4949
reference_id RHSA-2020:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4949
179
reference_url https://access.redhat.com/errata/RHSA-2020:4950
reference_id RHSA-2020:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4950
180
reference_url https://access.redhat.com/errata/RHSA-2020:4951
reference_id RHSA-2020:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4951
181
reference_url https://access.redhat.com/errata/RHSA-2020:4952
reference_id RHSA-2020:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4952
182
reference_url https://usn.ubuntu.com/4593-1/
reference_id USN-4593-1
reference_type
scores
url https://usn.ubuntu.com/4593-1/
183
reference_url https://usn.ubuntu.com/4593-2/
reference_id USN-4593-2
reference_type
scores
url https://usn.ubuntu.com/4593-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.2%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/freetype@2.10.2%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.2%252Bdfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2020-15999, GHSA-pv36-h7jh-qm62
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4
63
url VCID-p2yw-ksc4-jfe9
vulnerability_id VCID-p2yw-ksc4-jfe9
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9660
reference_id
reference_type
scores
0
value 0.04849
scoring_system epss
scoring_elements 0.89501
published_at 2026-04-01T12:55:00Z
1
value 0.04849
scoring_system epss
scoring_elements 0.89505
published_at 2026-04-02T12:55:00Z
2
value 0.04849
scoring_system epss
scoring_elements 0.89517
published_at 2026-04-07T12:55:00Z
3
value 0.04849
scoring_system epss
scoring_elements 0.89533
published_at 2026-04-08T12:55:00Z
4
value 0.04849
scoring_system epss
scoring_elements 0.89537
published_at 2026-04-13T12:55:00Z
5
value 0.04849
scoring_system epss
scoring_elements 0.89544
published_at 2026-04-11T12:55:00Z
6
value 0.04849
scoring_system epss
scoring_elements 0.89542
published_at 2026-04-12T12:55:00Z
7
value 0.04849
scoring_system epss
scoring_elements 0.8955
published_at 2026-04-21T12:55:00Z
8
value 0.04849
scoring_system epss
scoring_elements 0.89552
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191082
reference_id 1191082
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191082
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9660
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9
64
url VCID-p8h9-9xku-hbhv
vulnerability_id VCID-p8h9-9xku-hbhv
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9666
reference_id
reference_type
scores
0
value 0.01421
scoring_system epss
scoring_elements 0.80537
published_at 2026-04-01T12:55:00Z
1
value 0.01421
scoring_system epss
scoring_elements 0.80544
published_at 2026-04-02T12:55:00Z
2
value 0.01421
scoring_system epss
scoring_elements 0.80566
published_at 2026-04-04T12:55:00Z
3
value 0.01421
scoring_system epss
scoring_elements 0.80558
published_at 2026-04-07T12:55:00Z
4
value 0.01421
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-08T12:55:00Z
5
value 0.01421
scoring_system epss
scoring_elements 0.80597
published_at 2026-04-09T12:55:00Z
6
value 0.01421
scoring_system epss
scoring_elements 0.80614
published_at 2026-04-11T12:55:00Z
7
value 0.01421
scoring_system epss
scoring_elements 0.806
published_at 2026-04-12T12:55:00Z
8
value 0.01421
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-13T12:55:00Z
9
value 0.01421
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-16T12:55:00Z
10
value 0.01421
scoring_system epss
scoring_elements 0.80624
published_at 2026-04-18T12:55:00Z
11
value 0.01421
scoring_system epss
scoring_elements 0.80628
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191089
reference_id 1191089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191089
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9666
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv
65
url VCID-pznp-81q7-z3d4
vulnerability_id VCID-pznp-81q7-z3d4
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9658
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81172
published_at 2026-04-01T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-02T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81204
published_at 2026-04-07T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81232
published_at 2026-04-08T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81237
published_at 2026-04-09T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81257
published_at 2026-04-11T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.81243
published_at 2026-04-12T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.81236
published_at 2026-04-13T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81272
published_at 2026-04-16T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81274
published_at 2026-04-18T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191080
reference_id 1191080
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191080
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9658
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4
66
url VCID-pzsb-3h3d-t7hq
vulnerability_id VCID-pzsb-3h3d-t7hq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30106
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30106
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
15
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613160
reference_id 613160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613160
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
reference_id CVE-2010-2498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
28
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2498
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq
67
url VCID-qn37-kjm4-tbap
vulnerability_id VCID-qn37-kjm4-tbap
summary
A vulnerability has been discovered in FreeType allowing for user-assisted
    remote execution of arbitrary code.
references
0
reference_url http://issues.foresightlinux.org/browse/FL-223
reference_id
reference_type
scores
url http://issues.foresightlinux.org/browse/FL-223
1
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
reference_id
reference_type
scores
url http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2007-0125.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2007-0125.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1351
reference_id
reference_type
scores
0
value 0.07768
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-21T12:55:00Z
1
value 0.07768
scoring_system epss
scoring_elements 0.91916
published_at 2026-04-01T12:55:00Z
2
value 0.07768
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-02T12:55:00Z
3
value 0.07768
scoring_system epss
scoring_elements 0.91932
published_at 2026-04-04T12:55:00Z
4
value 0.07768
scoring_system epss
scoring_elements 0.91938
published_at 2026-04-07T12:55:00Z
5
value 0.07768
scoring_system epss
scoring_elements 0.91951
published_at 2026-04-08T12:55:00Z
6
value 0.07768
scoring_system epss
scoring_elements 0.91956
published_at 2026-04-13T12:55:00Z
7
value 0.07768
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-12T12:55:00Z
8
value 0.07768
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-16T12:55:00Z
9
value 0.07768
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1351
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
9
reference_url http://secunia.com/advisories/24741
reference_id
reference_type
scores
url http://secunia.com/advisories/24741
10
reference_url http://secunia.com/advisories/24745
reference_id
reference_type
scores
url http://secunia.com/advisories/24745
11
reference_url http://secunia.com/advisories/24756
reference_id
reference_type
scores
url http://secunia.com/advisories/24756
12
reference_url http://secunia.com/advisories/24758
reference_id
reference_type
scores
url http://secunia.com/advisories/24758
13
reference_url http://secunia.com/advisories/24765
reference_id
reference_type
scores
url http://secunia.com/advisories/24765
14
reference_url http://secunia.com/advisories/24768
reference_id
reference_type
scores
url http://secunia.com/advisories/24768
15
reference_url http://secunia.com/advisories/24770
reference_id
reference_type
scores
url http://secunia.com/advisories/24770
16
reference_url http://secunia.com/advisories/24771
reference_id
reference_type
scores
url http://secunia.com/advisories/24771
17
reference_url http://secunia.com/advisories/24772
reference_id
reference_type
scores
url http://secunia.com/advisories/24772
18
reference_url http://secunia.com/advisories/24776
reference_id
reference_type
scores
url http://secunia.com/advisories/24776
19
reference_url http://secunia.com/advisories/24791
reference_id
reference_type
scores
url http://secunia.com/advisories/24791
20
reference_url http://secunia.com/advisories/24885
reference_id
reference_type
scores
url http://secunia.com/advisories/24885
21
reference_url http://secunia.com/advisories/24889
reference_id
reference_type
scores
url http://secunia.com/advisories/24889
22
reference_url http://secunia.com/advisories/24921
reference_id
reference_type
scores
url http://secunia.com/advisories/24921
23
reference_url http://secunia.com/advisories/24996
reference_id
reference_type
scores
url http://secunia.com/advisories/24996
24
reference_url http://secunia.com/advisories/25004
reference_id
reference_type
scores
url http://secunia.com/advisories/25004
25
reference_url http://secunia.com/advisories/25006
reference_id
reference_type
scores
url http://secunia.com/advisories/25006
26
reference_url http://secunia.com/advisories/25096
reference_id
reference_type
scores
url http://secunia.com/advisories/25096
27
reference_url http://secunia.com/advisories/25195
reference_id
reference_type
scores
url http://secunia.com/advisories/25195
28
reference_url http://secunia.com/advisories/25216
reference_id
reference_type
scores
url http://secunia.com/advisories/25216
29
reference_url http://secunia.com/advisories/25305
reference_id
reference_type
scores
url http://secunia.com/advisories/25305
30
reference_url http://secunia.com/advisories/25495
reference_id
reference_type
scores
url http://secunia.com/advisories/25495
31
reference_url http://secunia.com/advisories/28333
reference_id
reference_type
scores
url http://secunia.com/advisories/28333
32
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
33
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
34
reference_url http://security.gentoo.org/glsa/glsa-200705-02.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-02.xml
35
reference_url http://security.gentoo.org/glsa/glsa-200705-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200705-10.xml
36
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
37
reference_url https://issues.rpath.com/browse/RPL-1213
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1213
38
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
39
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
40
reference_url http://sourceforge.net/project/shownotes.php?release_id=498954
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=498954
41
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
42
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
43
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
44
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
45
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
46
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
47
reference_url http://www.debian.org/security/2007/dsa-1294
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1294
48
reference_url http://www.debian.org/security/2008/dsa-1454
reference_id
reference_type
scores
url http://www.debian.org/security/2008/dsa-1454
49
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
50
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
51
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
52
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
53
reference_url http://www.novell.com/linux/security/advisories/2007_27_x.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_27_x.html
54
reference_url http://www.novell.com/linux/security/advisories/2007_6_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_6_sr.html
55
reference_url http://www.openbsd.org/errata39.html#021_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata39.html#021_xorg
56
reference_url http://www.openbsd.org/errata40.html#011_xorg
reference_id
reference_type
scores
url http://www.openbsd.org/errata40.html#011_xorg
57
reference_url http://www.redhat.com/support/errata/RHSA-2007-0126.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0126.html
58
reference_url http://www.redhat.com/support/errata/RHSA-2007-0132.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0132.html
59
reference_url http://www.redhat.com/support/errata/RHSA-2007-0150.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0150.html
60
reference_url http://www.securityfocus.com/archive/1/464686/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464686/100/0/threaded
61
reference_url http://www.securityfocus.com/archive/1/464816/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464816/100/0/threaded
62
reference_url http://www.securityfocus.com/bid/23283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23283
63
reference_url http://www.securityfocus.com/bid/23300
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23300
64
reference_url http://www.securityfocus.com/bid/23402
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/23402
65
reference_url http://www.securitytracker.com/id?1017857
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1017857
66
reference_url http://www.trustix.org/errata/2007/0013/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0013/
67
reference_url http://www.ubuntu.com/usn/usn-448-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-448-1
68
reference_url http://www.vupen.com/english/advisories/2007/1217
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1217
69
reference_url http://www.vupen.com/english/advisories/2007/1264
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1264
70
reference_url http://www.vupen.com/english/advisories/2007/1548
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1548
71
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=235265
reference_id 235265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=235265
72
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771
reference_id 426771
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-1351
reference_id CVE-2007-1351
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-1351
119
reference_url https://security.gentoo.org/glsa/200705-02
reference_id GLSA-200705-02
reference_type
scores
url https://security.gentoo.org/glsa/200705-02
120
reference_url https://security.gentoo.org/glsa/200705-10
reference_id GLSA-200705-10
reference_type
scores
url https://security.gentoo.org/glsa/200705-10
121
reference_url https://access.redhat.com/errata/RHSA-2007:0125
reference_id RHSA-2007:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0125
122
reference_url https://access.redhat.com/errata/RHSA-2007:0126
reference_id RHSA-2007:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0126
123
reference_url https://access.redhat.com/errata/RHSA-2007:0132
reference_id RHSA-2007:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0132
124
reference_url https://access.redhat.com/errata/RHSA-2007:0150
reference_id RHSA-2007:0150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0150
125
reference_url https://usn.ubuntu.com/448-1/
reference_id USN-448-1
reference_type
scores
url https://usn.ubuntu.com/448-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.3.5-1?distro=trixie
purl pkg:deb/debian/freetype@2.3.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.5-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2007-1351
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qn37-kjm4-tbap
68
url VCID-qu13-pxwm-d3da
vulnerability_id VCID-qu13-pxwm-d3da
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5670
reference_id
reference_type
scores
0
value 0.02977
scoring_system epss
scoring_elements 0.86531
published_at 2026-04-21T12:55:00Z
1
value 0.02977
scoring_system epss
scoring_elements 0.86453
published_at 2026-04-01T12:55:00Z
2
value 0.02977
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-02T12:55:00Z
3
value 0.02977
scoring_system epss
scoring_elements 0.86482
published_at 2026-04-04T12:55:00Z
4
value 0.02977
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-07T12:55:00Z
5
value 0.02977
scoring_system epss
scoring_elements 0.86501
published_at 2026-04-08T12:55:00Z
6
value 0.02977
scoring_system epss
scoring_elements 0.86511
published_at 2026-04-09T12:55:00Z
7
value 0.02977
scoring_system epss
scoring_elements 0.86526
published_at 2026-04-11T12:55:00Z
8
value 0.02977
scoring_system epss
scoring_elements 0.86523
published_at 2026-04-12T12:55:00Z
9
value 0.02977
scoring_system epss
scoring_elements 0.86517
published_at 2026-04-13T12:55:00Z
10
value 0.02977
scoring_system epss
scoring_elements 0.86532
published_at 2026-04-16T12:55:00Z
11
value 0.02977
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5670
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670
6
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
7
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
8
reference_url https://savannah.nongnu.org/bugs/?37907
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37907
9
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
10
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
11
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
12
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
13
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890094
reference_id 890094
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890094
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5670
reference_id CVE-2012-5670
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5670
64
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
65
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5670
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da
69
url VCID-rcck-xn4c-k3at
vulnerability_id VCID-rcck-xn4c-k3at
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
reference_id
reference_type
scores
0
value 0.0261
scoring_system epss
scoring_elements 0.85665
published_at 2026-04-18T12:55:00Z
1
value 0.0261
scoring_system epss
scoring_elements 0.85565
published_at 2026-04-01T12:55:00Z
2
value 0.0261
scoring_system epss
scoring_elements 0.85577
published_at 2026-04-02T12:55:00Z
3
value 0.0261
scoring_system epss
scoring_elements 0.85594
published_at 2026-04-04T12:55:00Z
4
value 0.0261
scoring_system epss
scoring_elements 0.856
published_at 2026-04-07T12:55:00Z
5
value 0.0261
scoring_system epss
scoring_elements 0.8562
published_at 2026-04-08T12:55:00Z
6
value 0.0261
scoring_system epss
scoring_elements 0.85631
published_at 2026-04-09T12:55:00Z
7
value 0.0261
scoring_system epss
scoring_elements 0.85644
published_at 2026-04-11T12:55:00Z
8
value 0.0261
scoring_system epss
scoring_elements 0.85641
published_at 2026-04-12T12:55:00Z
9
value 0.0261
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-13T12:55:00Z
10
value 0.0261
scoring_system epss
scoring_elements 0.8566
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://secunia.com/advisories/35204
reference_id
reference_type
scores
url http://secunia.com/advisories/35204
27
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
28
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
29
reference_url http://securitytracker.com/id?1020240
reference_id
reference_type
scores
url http://securitytracker.com/id?1020240
30
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
31
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
34
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
35
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
36
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
37
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
39
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
40
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2009-0329.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0329.html
45
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/29637
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29637
48
reference_url http://www.securityfocus.com/bid/29639
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29639
49
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
50
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
51
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
52
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
53
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
54
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
55
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
56
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
57
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
58
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
59
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
60
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
61
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450774
reference_id 450774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450774
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
reference_id CVE-2008-1808
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
77
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
78
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
79
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
80
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
81
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
82
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.3.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.3.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-1808
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at
70
url VCID-s148-7tzs-gfg8
vulnerability_id VCID-s148-7tzs-gfg8
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.2582
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25882
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25841
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25788
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25743
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
reference_id 2077991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-27405
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8
71
url VCID-s3f6-paas-vye4
vulnerability_id VCID-s3f6-paas-vye4
summary
A buffer overflow was discovered in the PCF font parser, potentially
    resulting in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3467
reference_id
reference_type
scores
0
value 0.08679
scoring_system epss
scoring_elements 0.92432
published_at 2026-04-01T12:55:00Z
1
value 0.08679
scoring_system epss
scoring_elements 0.92439
published_at 2026-04-02T12:55:00Z
2
value 0.08679
scoring_system epss
scoring_elements 0.92447
published_at 2026-04-04T12:55:00Z
3
value 0.08679
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-07T12:55:00Z
4
value 0.08679
scoring_system epss
scoring_elements 0.92461
published_at 2026-04-08T12:55:00Z
5
value 0.08679
scoring_system epss
scoring_elements 0.92466
published_at 2026-04-09T12:55:00Z
6
value 0.08679
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-11T12:55:00Z
7
value 0.08679
scoring_system epss
scoring_elements 0.92475
published_at 2026-04-12T12:55:00Z
8
value 0.08679
scoring_system epss
scoring_elements 0.92473
published_at 2026-04-13T12:55:00Z
9
value 0.08679
scoring_system epss
scoring_elements 0.92483
published_at 2026-04-18T12:55:00Z
10
value 0.08679
scoring_system epss
scoring_elements 0.92486
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920
reference_id 379920
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353
reference_id 383353
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=487070
reference_id 487070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=487070
6
reference_url https://security.gentoo.org/glsa/200609-04
reference_id GLSA-200609-04
reference_type
scores
url https://security.gentoo.org/glsa/200609-04
7
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
8
reference_url https://access.redhat.com/errata/RHSA-2006:0634
reference_id RHSA-2006:0634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0634
9
reference_url https://access.redhat.com/errata/RHSA-2006:0635
reference_id RHSA-2006:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0635
10
reference_url https://usn.ubuntu.com/324-1/
reference_id USN-324-1
reference_type
scores
url https://usn.ubuntu.com/324-1/
11
reference_url https://usn.ubuntu.com/341-1/
reference_id USN-341-1
reference_type
scores
url https://usn.ubuntu.com/341-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.2.1-5?distro=trixie
purl pkg:deb/debian/freetype@2.2.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2006-3467
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3f6-paas-vye4
72
url VCID-s9u5-4nwv-vudq
vulnerability_id VCID-s9u5-4nwv-vudq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-0216.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0216.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5669
reference_id
reference_type
scores
0
value 0.01687
scoring_system epss
scoring_elements 0.8225
published_at 2026-04-21T12:55:00Z
1
value 0.01687
scoring_system epss
scoring_elements 0.82142
published_at 2026-04-01T12:55:00Z
2
value 0.01687
scoring_system epss
scoring_elements 0.82155
published_at 2026-04-02T12:55:00Z
3
value 0.01687
scoring_system epss
scoring_elements 0.82177
published_at 2026-04-04T12:55:00Z
4
value 0.01687
scoring_system epss
scoring_elements 0.82173
published_at 2026-04-07T12:55:00Z
5
value 0.01687
scoring_system epss
scoring_elements 0.822
published_at 2026-04-08T12:55:00Z
6
value 0.01687
scoring_system epss
scoring_elements 0.82207
published_at 2026-04-09T12:55:00Z
7
value 0.01687
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-11T12:55:00Z
8
value 0.01687
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-12T12:55:00Z
9
value 0.01687
scoring_system epss
scoring_elements 0.82213
published_at 2026-04-13T12:55:00Z
10
value 0.01687
scoring_system epss
scoring_elements 0.82249
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5669
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669
8
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
9
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
10
reference_url https://savannah.nongnu.org/bugs/?37906
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37906
11
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
12
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
13
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
14
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
15
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890088
reference_id 890088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890088
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5669
reference_id CVE-2012-5669
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5669
66
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
67
reference_url https://access.redhat.com/errata/RHSA-2013:0216
reference_id RHSA-2013:0216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0216
68
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5669
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq
73
url VCID-th47-m45d-m7dk
vulnerability_id VCID-th47-m45d-m7dk
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9667
reference_id
reference_type
scores
0
value 0.02029
scoring_system epss
scoring_elements 0.83727
published_at 2026-04-01T12:55:00Z
1
value 0.02029
scoring_system epss
scoring_elements 0.8374
published_at 2026-04-02T12:55:00Z
2
value 0.02029
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-04T12:55:00Z
3
value 0.02029
scoring_system epss
scoring_elements 0.83756
published_at 2026-04-07T12:55:00Z
4
value 0.02029
scoring_system epss
scoring_elements 0.8378
published_at 2026-04-08T12:55:00Z
5
value 0.02029
scoring_system epss
scoring_elements 0.83786
published_at 2026-04-09T12:55:00Z
6
value 0.02029
scoring_system epss
scoring_elements 0.83802
published_at 2026-04-11T12:55:00Z
7
value 0.02029
scoring_system epss
scoring_elements 0.83796
published_at 2026-04-12T12:55:00Z
8
value 0.02029
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-13T12:55:00Z
9
value 0.02029
scoring_system epss
scoring_elements 0.83825
published_at 2026-04-16T12:55:00Z
10
value 0.02029
scoring_system epss
scoring_elements 0.83826
published_at 2026-04-18T12:55:00Z
11
value 0.02029
scoring_system epss
scoring_elements 0.83827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9667
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191090
reference_id 1191090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191090
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9667
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk
74
url VCID-tmb5-g2ua-ekek
vulnerability_id VCID-tmb5-g2ua-ekek
summary freetype: OOB stack-based read/write in cf2_hintmap_build()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2241
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69893
published_at 2026-04-01T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69906
published_at 2026-04-02T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.6992
published_at 2026-04-04T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69898
published_at 2026-04-07T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69946
published_at 2026-04-08T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69962
published_at 2026-04-09T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69986
published_at 2026-04-11T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.6997
published_at 2026-04-12T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69957
published_at 2026-04-13T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.7
published_at 2026-04-16T12:55:00Z
10
value 0.00618
scoring_system epss
scoring_elements 0.7001
published_at 2026-04-18T12:55:00Z
11
value 0.00618
scoring_system epss
scoring_elements 0.69992
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
reference_id 1074646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1074646
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
reference_id 741299
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299
5
reference_url https://usn.ubuntu.com/2148-1/
reference_id USN-2148-1
reference_type
scores
url https://usn.ubuntu.com/2148-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-1.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-2241
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek
75
url VCID-tsw4-kqbc-kqf1
vulnerability_id VCID-tsw4-kqbc-kqf1
summary freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.722
published_at 2026-04-01T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72282
published_at 2026-04-21T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-13T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72285
published_at 2026-04-16T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-18T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72205
published_at 2026-04-02T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72225
published_at 2026-04-04T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-07T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-08T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-09T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-11T12:55:00Z
11
value 0.00711
scoring_system epss
scoring_elements 0.72256
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45955
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45955
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
reference_id 1752788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
reference_id CVE-2015-9381
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
purl pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-9381
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1
76
url VCID-tu7r-tsp8-73ew
vulnerability_id VCID-tu7r-tsp8-73ew
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9673
reference_id
reference_type
scores
0
value 0.04219
scoring_system epss
scoring_elements 0.88707
published_at 2026-04-01T12:55:00Z
1
value 0.04219
scoring_system epss
scoring_elements 0.88717
published_at 2026-04-02T12:55:00Z
2
value 0.04219
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-04T12:55:00Z
3
value 0.04219
scoring_system epss
scoring_elements 0.88734
published_at 2026-04-07T12:55:00Z
4
value 0.04219
scoring_system epss
scoring_elements 0.88751
published_at 2026-04-08T12:55:00Z
5
value 0.04219
scoring_system epss
scoring_elements 0.88756
published_at 2026-04-09T12:55:00Z
6
value 0.04219
scoring_system epss
scoring_elements 0.88768
published_at 2026-04-11T12:55:00Z
7
value 0.04219
scoring_system epss
scoring_elements 0.88763
published_at 2026-04-13T12:55:00Z
8
value 0.04219
scoring_system epss
scoring_elements 0.88776
published_at 2026-04-16T12:55:00Z
9
value 0.04219
scoring_system epss
scoring_elements 0.88774
published_at 2026-04-18T12:55:00Z
10
value 0.04219
scoring_system epss
scoring_elements 0.88772
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191096
reference_id 1191096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191096
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9673
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew
77
url VCID-txkg-jsdf-93e6
vulnerability_id VCID-txkg-jsdf-93e6
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1807
reference_id
reference_type
scores
0
value 0.05336
scoring_system epss
scoring_elements 0.90069
published_at 2026-04-21T12:55:00Z
1
value 0.05336
scoring_system epss
scoring_elements 0.90013
published_at 2026-04-01T12:55:00Z
2
value 0.05336
scoring_system epss
scoring_elements 0.90016
published_at 2026-04-02T12:55:00Z
3
value 0.05336
scoring_system epss
scoring_elements 0.90027
published_at 2026-04-04T12:55:00Z
4
value 0.05336
scoring_system epss
scoring_elements 0.90032
published_at 2026-04-07T12:55:00Z
5
value 0.05336
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-08T12:55:00Z
6
value 0.05336
scoring_system epss
scoring_elements 0.90053
published_at 2026-04-09T12:55:00Z
7
value 0.05336
scoring_system epss
scoring_elements 0.90062
published_at 2026-04-11T12:55:00Z
8
value 0.05336
scoring_system epss
scoring_elements 0.9006
published_at 2026-04-12T12:55:00Z
9
value 0.05336
scoring_system epss
scoring_elements 0.90055
published_at 2026-04-13T12:55:00Z
10
value 0.05336
scoring_system epss
scoring_elements 0.90071
published_at 2026-04-16T12:55:00Z
11
value 0.05336
scoring_system epss
scoring_elements 0.90072
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
27
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
28
reference_url http://securitytracker.com/id?1020239
reference_id
reference_type
scores
url http://securitytracker.com/id?1020239
29
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
30
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
31
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767
32
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
33
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
34
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
35
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
36
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
37
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
39
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
41
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
43
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
45
reference_url http://www.securityfocus.com/bid/29641
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29641
46
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
47
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
48
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
49
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
50
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
51
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
52
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
53
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
54
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
55
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
56
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
57
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
58
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
59
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450773
reference_id 450773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450773
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1807
reference_id CVE-2008-1807
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1807
66
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
67
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
68
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
69
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
70
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.3.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.3.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-1807
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6
78
url VCID-tyhk-9jvd-y7bj
vulnerability_id VCID-tyhk-9jvd-y7bj
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
reference_id
reference_type
scores
0
value 0.03154
scoring_system epss
scoring_elements 0.86924
published_at 2026-04-21T12:55:00Z
1
value 0.03154
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-01T12:55:00Z
2
value 0.03154
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-02T12:55:00Z
3
value 0.03154
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-04T12:55:00Z
4
value 0.03154
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-07T12:55:00Z
5
value 0.03154
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-08T12:55:00Z
6
value 0.03154
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-09T12:55:00Z
7
value 0.03154
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-11T12:55:00Z
8
value 0.03154
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-12T12:55:00Z
9
value 0.03154
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-13T12:55:00Z
10
value 0.03154
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30361
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30361
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
13
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613198
reference_id 613198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613198
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
reference_id CVE-2010-2520
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
24
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2520
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj
79
url VCID-u15r-u7zz-17ad
vulnerability_id VCID-u15r-u7zz-17ad
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9672
reference_id
reference_type
scores
0
value 0.04704
scoring_system epss
scoring_elements 0.89322
published_at 2026-04-01T12:55:00Z
1
value 0.04704
scoring_system epss
scoring_elements 0.89327
published_at 2026-04-02T12:55:00Z
2
value 0.04704
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-04T12:55:00Z
3
value 0.04704
scoring_system epss
scoring_elements 0.89341
published_at 2026-04-07T12:55:00Z
4
value 0.04704
scoring_system epss
scoring_elements 0.89358
published_at 2026-04-08T12:55:00Z
5
value 0.04704
scoring_system epss
scoring_elements 0.89362
published_at 2026-04-09T12:55:00Z
6
value 0.04704
scoring_system epss
scoring_elements 0.89371
published_at 2026-04-11T12:55:00Z
7
value 0.04704
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-12T12:55:00Z
8
value 0.04704
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-13T12:55:00Z
9
value 0.04704
scoring_system epss
scoring_elements 0.8938
published_at 2026-04-18T12:55:00Z
10
value 0.04704
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9672
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191095
reference_id 1191095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191095
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9672
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad
80
url VCID-uh3u-pzzg-fkgg
vulnerability_id VCID-uh3u-pzzg-fkgg
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9661
reference_id
reference_type
scores
0
value 0.04948
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-01T12:55:00Z
1
value 0.04948
scoring_system epss
scoring_elements 0.89613
published_at 2026-04-02T12:55:00Z
2
value 0.04948
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-04T12:55:00Z
3
value 0.04948
scoring_system epss
scoring_elements 0.89627
published_at 2026-04-07T12:55:00Z
4
value 0.04948
scoring_system epss
scoring_elements 0.89644
published_at 2026-04-08T12:55:00Z
5
value 0.04948
scoring_system epss
scoring_elements 0.89649
published_at 2026-04-09T12:55:00Z
6
value 0.04948
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-11T12:55:00Z
7
value 0.04948
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-12T12:55:00Z
8
value 0.04948
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-13T12:55:00Z
9
value 0.04948
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-16T12:55:00Z
10
value 0.04948
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-18T12:55:00Z
11
value 0.04948
scoring_system epss
scoring_elements 0.89659
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191083
reference_id 1191083
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191083
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://access.redhat.com/errata/RHSA-2015:0696
reference_id RHSA-2015:0696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0696
21
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9661
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg
81
url VCID-uhnk-v91u-p7e5
vulnerability_id VCID-uhnk-v91u-p7e5
summary
Multiple vulnerabilities have been found in FreeType, possibly
    resulting in Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9656
reference_id
reference_type
scores
0
value 0.02464
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-01T12:55:00Z
1
value 0.02464
scoring_system epss
scoring_elements 0.85191
published_at 2026-04-02T12:55:00Z
2
value 0.02464
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-04T12:55:00Z
3
value 0.02464
scoring_system epss
scoring_elements 0.8521
published_at 2026-04-07T12:55:00Z
4
value 0.02464
scoring_system epss
scoring_elements 0.85232
published_at 2026-04-08T12:55:00Z
5
value 0.02464
scoring_system epss
scoring_elements 0.8524
published_at 2026-04-09T12:55:00Z
6
value 0.02464
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-11T12:55:00Z
7
value 0.02464
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-12T12:55:00Z
8
value 0.02464
scoring_system epss
scoring_elements 0.8525
published_at 2026-04-13T12:55:00Z
9
value 0.02464
scoring_system epss
scoring_elements 0.8527
published_at 2026-04-21T12:55:00Z
10
value 0.02464
scoring_system epss
scoring_elements 0.85271
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9656
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191078
reference_id 1191078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191078
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
reference_id 777656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656
19
reference_url https://security.gentoo.org/glsa/201503-05
reference_id GLSA-201503-05
reference_type
scores
url https://security.gentoo.org/glsa/201503-05
20
reference_url https://usn.ubuntu.com/2510-1/
reference_id USN-2510-1
reference_type
scores
url https://usn.ubuntu.com/2510-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3?distro=trixie
purl pkg:deb/debian/freetype@2.5.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9656
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5
82
url VCID-uy24-k7je-pyhr
vulnerability_id VCID-uy24-k7je-pyhr
summary A vulnerability has been discovered in FreeType, which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
reference_id
reference_type
scores
0
value 0.63439
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-13T12:55:00Z
1
value 0.63439
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-16T12:55:00Z
2
value 0.63439
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-18T12:55:00Z
3
value 0.64976
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-07T12:55:00Z
4
value 0.64976
scoring_system epss
scoring_elements 0.98459
published_at 2026-04-02T12:55:00Z
5
value 0.64976
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-04T12:55:00Z
6
value 0.64976
scoring_system epss
scoring_elements 0.98467
published_at 2026-04-08T12:55:00Z
7
value 0.64976
scoring_system epss
scoring_elements 0.98468
published_at 2026-04-09T12:55:00Z
8
value 0.68721
scoring_system epss
scoring_elements 0.98627
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
reference_id 2351357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
5
reference_url https://security.archlinux.org/ASA-202505-11
reference_id ASA-202505-11
reference_type
scores
url https://security.archlinux.org/ASA-202505-11
6
reference_url https://security.archlinux.org/AVG-2877
reference_id AVG-2877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2877
7
reference_url https://www.facebook.com/security/advisories/cve-2025-27363
reference_id cve-2025-27363
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/
url https://www.facebook.com/security/advisories/cve-2025-27363
8
reference_url https://security.gentoo.org/glsa/202505-07
reference_id GLSA-202505-07
reference_type
scores
url https://security.gentoo.org/glsa/202505-07
9
reference_url https://access.redhat.com/errata/RHSA-2025:3382
reference_id RHSA-2025:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3382
10
reference_url https://access.redhat.com/errata/RHSA-2025:3383
reference_id RHSA-2025:3383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3383
11
reference_url https://access.redhat.com/errata/RHSA-2025:3384
reference_id RHSA-2025:3384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3384
12
reference_url https://access.redhat.com/errata/RHSA-2025:3385
reference_id RHSA-2025:3385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3385
13
reference_url https://access.redhat.com/errata/RHSA-2025:3386
reference_id RHSA-2025:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3386
14
reference_url https://access.redhat.com/errata/RHSA-2025:3387
reference_id RHSA-2025:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3387
15
reference_url https://access.redhat.com/errata/RHSA-2025:3393
reference_id RHSA-2025:3393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3393
16
reference_url https://access.redhat.com/errata/RHSA-2025:3395
reference_id RHSA-2025:3395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3395
17
reference_url https://access.redhat.com/errata/RHSA-2025:3407
reference_id RHSA-2025:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3407
18
reference_url https://access.redhat.com/errata/RHSA-2025:3421
reference_id RHSA-2025:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3421
19
reference_url https://access.redhat.com/errata/RHSA-2025:8195
reference_id RHSA-2025:8195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8195
20
reference_url https://access.redhat.com/errata/RHSA-2025:8219
reference_id RHSA-2025:8219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8219
21
reference_url https://access.redhat.com/errata/RHSA-2025:8253
reference_id RHSA-2025:8253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8253
22
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8292
23
reference_url https://access.redhat.com/errata/RHSA-2025:9380
reference_id RHSA-2025:9380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9380
24
reference_url https://usn.ubuntu.com/7352-1/
reference_id USN-7352-1
reference_type
scores
url https://usn.ubuntu.com/7352-1/
25
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.1%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.1%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
6
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-27363
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr
83
url VCID-v6um-wgpt-myax
vulnerability_id VCID-v6um-wgpt-myax
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3439
reference_id
reference_type
scores
0
value 0.06537
scoring_system epss
scoring_elements 0.91075
published_at 2026-04-01T12:55:00Z
1
value 0.06537
scoring_system epss
scoring_elements 0.91081
published_at 2026-04-02T12:55:00Z
2
value 0.06537
scoring_system epss
scoring_elements 0.91089
published_at 2026-04-04T12:55:00Z
3
value 0.06537
scoring_system epss
scoring_elements 0.91098
published_at 2026-04-07T12:55:00Z
4
value 0.06537
scoring_system epss
scoring_elements 0.91111
published_at 2026-04-08T12:55:00Z
5
value 0.06537
scoring_system epss
scoring_elements 0.91116
published_at 2026-04-09T12:55:00Z
6
value 0.06537
scoring_system epss
scoring_elements 0.91124
published_at 2026-04-13T12:55:00Z
7
value 0.06537
scoring_system epss
scoring_elements 0.91125
published_at 2026-04-12T12:55:00Z
8
value 0.06537
scoring_system epss
scoring_elements 0.91148
published_at 2026-04-18T12:55:00Z
9
value 0.06537
scoring_system epss
scoring_elements 0.91152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122
reference_id 649122
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=753799
reference_id 753799
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=753799
5
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
6
reference_url https://access.redhat.com/errata/RHSA-2011:1455
reference_id RHSA-2011:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1455
7
reference_url https://access.redhat.com/errata/RHSA-2012:0094
reference_id RHSA-2012:0094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0094
8
reference_url https://usn.ubuntu.com/1267-1/
reference_id USN-1267-1
reference_type
scores
url https://usn.ubuntu.com/1267-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.8-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.8-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-3439
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax
84
url VCID-vykx-mb8e-hyfv
vulnerability_id VCID-vykx-mb8e-hyfv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
2
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
3
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
4
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
5
reference_url http://osvdb.org/66828
reference_id
reference_type
scores
url http://osvdb.org/66828
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
reference_id
reference_type
scores
0
value 0.5972
scoring_system epss
scoring_elements 0.98264
published_at 2026-04-18T12:55:00Z
1
value 0.5972
scoring_system epss
scoring_elements 0.98242
published_at 2026-04-01T12:55:00Z
2
value 0.5972
scoring_system epss
scoring_elements 0.98245
published_at 2026-04-02T12:55:00Z
3
value 0.5972
scoring_system epss
scoring_elements 0.98248
published_at 2026-04-07T12:55:00Z
4
value 0.5972
scoring_system epss
scoring_elements 0.98253
published_at 2026-04-08T12:55:00Z
5
value 0.5972
scoring_system epss
scoring_elements 0.98254
published_at 2026-04-09T12:55:00Z
6
value 0.5972
scoring_system epss
scoring_elements 0.98257
published_at 2026-04-13T12:55:00Z
7
value 0.5972
scoring_system epss
scoring_elements 0.98263
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
10
reference_url http://secunia.com/advisories/40807
reference_id
reference_type
scores
url http://secunia.com/advisories/40807
11
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
12
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
15
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
16
reference_url http://support.apple.com/kb/HT4291
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4291
17
reference_url http://support.apple.com/kb/HT4292
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4292
18
reference_url http://www.exploit-db.com/exploits/14538
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/14538
19
reference_url http://www.f-secure.com/weblog/archives/00002002.html
reference_id
reference_type
scores
url http://www.f-secure.com/weblog/archives/00002002.html
20
reference_url http://www.securityfocus.com/bid/42151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42151
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621144
reference_id 621144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621144
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
reference_id CVE-2010-1797
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
reference_id CVE-2010-1797;OSVDB-66828
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
92
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
reference_id CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
93
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
94
reference_url https://access.redhat.com/errata/RHSA-2010:0607
reference_id RHSA-2010:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0607
95
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-1797
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv
85
url VCID-wapu-grak-1bca
vulnerability_id VCID-wapu-grak-1bca
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
reference_id
reference_type
scores
0
value 0.05858
scoring_system epss
scoring_elements 0.90573
published_at 2026-04-21T12:55:00Z
1
value 0.05858
scoring_system epss
scoring_elements 0.90517
published_at 2026-04-01T12:55:00Z
2
value 0.05858
scoring_system epss
scoring_elements 0.90521
published_at 2026-04-02T12:55:00Z
3
value 0.05858
scoring_system epss
scoring_elements 0.90531
published_at 2026-04-04T12:55:00Z
4
value 0.05858
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-07T12:55:00Z
5
value 0.05858
scoring_system epss
scoring_elements 0.90549
published_at 2026-04-08T12:55:00Z
6
value 0.05858
scoring_system epss
scoring_elements 0.90556
published_at 2026-04-09T12:55:00Z
7
value 0.05858
scoring_system epss
scoring_elements 0.90564
published_at 2026-04-12T12:55:00Z
8
value 0.05858
scoring_system epss
scoring_elements 0.90558
published_at 2026-04-13T12:55:00Z
9
value 0.05858
scoring_system epss
scoring_elements 0.90575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800592
reference_id 800592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800592
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
reference_id CVE-2012-1134
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1134
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca
86
url VCID-wbve-vpw4-tqhe
vulnerability_id VCID-wbve-vpw4-tqhe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
reference_id
reference_type
scores
0
value 0.0452
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-21T12:55:00Z
1
value 0.0452
scoring_system epss
scoring_elements 0.89105
published_at 2026-04-01T12:55:00Z
2
value 0.0452
scoring_system epss
scoring_elements 0.89114
published_at 2026-04-02T12:55:00Z
3
value 0.0452
scoring_system epss
scoring_elements 0.89128
published_at 2026-04-04T12:55:00Z
4
value 0.0452
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-07T12:55:00Z
5
value 0.0452
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-08T12:55:00Z
6
value 0.0452
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-09T12:55:00Z
7
value 0.0452
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-11T12:55:00Z
8
value 0.0452
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-12T12:55:00Z
9
value 0.0452
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-13T12:55:00Z
10
value 0.0452
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30306
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30306
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613194
reference_id 613194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613194
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
reference_id CVE-2010-2519
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
29
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2519
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe
87
url VCID-wr9p-x4sm-aqdh
vulnerability_id VCID-wr9p-x4sm-aqdh
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.73951
published_at 2026-04-01T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74048
published_at 2026-04-18T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-08T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.74002
published_at 2026-04-09T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74024
published_at 2026-04-11T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74006
published_at 2026-04-12T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.73999
published_at 2026-04-13T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-21T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-02T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.73984
published_at 2026-04-04T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99091
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99091
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
reference_id 1446073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
reference_id 861308
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
reference_id CVE-2017-8287
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
20
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
21
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
22
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie
purl pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-8287
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh
88
url VCID-xb9q-dk8j-fbch
vulnerability_id VCID-xb9q-dk8j-fbch
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-02T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-04T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-07T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31584
published_at 2026-04-08T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31614
published_at 2026-04-09T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-11T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31576
published_at 2026-04-12T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-13T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-16T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31551
published_at 2026-04-18T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
reference_id 2077989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-27404
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch
89
url VCID-xe45-fv7j-4ucr
vulnerability_id VCID-xe45-fv7j-4ucr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
reference_id
reference_type
scores
0
value 0.03091
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-21T12:55:00Z
1
value 0.03091
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-01T12:55:00Z
2
value 0.03091
scoring_system epss
scoring_elements 0.86738
published_at 2026-04-02T12:55:00Z
3
value 0.03091
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-04T12:55:00Z
4
value 0.03091
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-07T12:55:00Z
5
value 0.03091
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-08T12:55:00Z
6
value 0.03091
scoring_system epss
scoring_elements 0.86784
published_at 2026-04-09T12:55:00Z
7
value 0.03091
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-11T12:55:00Z
8
value 0.03091
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-12T12:55:00Z
9
value 0.03091
scoring_system epss
scoring_elements 0.8679
published_at 2026-04-13T12:55:00Z
10
value 0.03091
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-16T12:55:00Z
11
value 0.03091
scoring_system epss
scoring_elements 0.8681
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800581
reference_id 800581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800581
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
reference_id CVE-2012-1126
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1126
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr
90
url VCID-xyay-hhmw-cyb1
vulnerability_id VCID-xyay-hhmw-cyb1
summary
Multiple vulnerabilities have been found in FreeType, allowing
    context-dependent attackers to possibly execute arbitrary code or cause
    Denial of Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5668
reference_id
reference_type
scores
0
value 0.02815
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-21T12:55:00Z
1
value 0.02815
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-01T12:55:00Z
2
value 0.02815
scoring_system epss
scoring_elements 0.86087
published_at 2026-04-02T12:55:00Z
3
value 0.02815
scoring_system epss
scoring_elements 0.86104
published_at 2026-04-04T12:55:00Z
4
value 0.02815
scoring_system epss
scoring_elements 0.86103
published_at 2026-04-07T12:55:00Z
5
value 0.02815
scoring_system epss
scoring_elements 0.86122
published_at 2026-04-08T12:55:00Z
6
value 0.02815
scoring_system epss
scoring_elements 0.86133
published_at 2026-04-09T12:55:00Z
7
value 0.02815
scoring_system epss
scoring_elements 0.86148
published_at 2026-04-11T12:55:00Z
8
value 0.02815
scoring_system epss
scoring_elements 0.86146
published_at 2026-04-12T12:55:00Z
9
value 0.02815
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-13T12:55:00Z
10
value 0.02815
scoring_system epss
scoring_elements 0.8616
published_at 2026-04-16T12:55:00Z
11
value 0.02815
scoring_system epss
scoring_elements 0.86165
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5668
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668
7
reference_url http://secunia.com/advisories/51826
reference_id
reference_type
scores
url http://secunia.com/advisories/51826
8
reference_url http://secunia.com/advisories/51900
reference_id
reference_type
scores
url http://secunia.com/advisories/51900
9
reference_url https://savannah.nongnu.org/bugs/?37905
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?37905
10
reference_url http://www.freetype.org/
reference_id
reference_type
scores
url http://www.freetype.org/
11
reference_url http://www.openwall.com/lists/oss-security/2012/12/25/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/25/2
12
reference_url http://www.securitytracker.com/id?1027921
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027921
13
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186
14
reference_url http://www.ubuntu.com/usn/USN-1686-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1686-1
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
reference_id 696691
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=890087
reference_id 890087
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=890087
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5668
reference_id CVE-2012-5668
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5668
65
reference_url https://security.gentoo.org/glsa/201402-16
reference_id GLSA-201402-16
reference_type
scores
url https://security.gentoo.org/glsa/201402-16
66
reference_url https://usn.ubuntu.com/1686-1/
reference_id USN-1686-1
reference_type
scores
url https://usn.ubuntu.com/1686-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5668
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1
91
url VCID-y4qf-qfbv-mqdg
vulnerability_id VCID-y4qf-qfbv-mqdg
summary freetype: NULL pointer dereference in the Ins_GETVARIATION() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41643
published_at 2026-04-21T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41695
published_at 2026-04-13T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41742
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41717
published_at 2026-04-18T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.4916
published_at 2026-04-04T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49164
published_at 2026-04-09T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49181
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49098
published_at 2026-04-01T12:55:00Z
10
value 0.00258
scoring_system epss
scoring_elements 0.49113
published_at 2026-04-07T12:55:00Z
11
value 0.00258
scoring_system epss
scoring_elements 0.49131
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
reference_id 1544771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
reference_id 890450
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
5
reference_url https://security.archlinux.org/ASA-201805-3
reference_id ASA-201805-3
reference_type
scores
url https://security.archlinux.org/ASA-201805-3
6
reference_url https://security.archlinux.org/AVG-613
reference_id AVG-613
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-613
7
reference_url https://usn.ubuntu.com/3572-1/
reference_id USN-3572-1
reference_type
scores
url https://usn.ubuntu.com/3572-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3?distro=trixie
purl pkg:deb/debian/freetype@2.9.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2018-6942
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg
92
url VCID-yddp-8puj-dbaj
vulnerability_id VCID-yddp-8puj-dbaj
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf47fc0775cc9705673caf0c47a81f94b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf47fc0775cc9705673caf0c47a81f94b
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7857.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7857.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7857
reference_id
reference_type
scores
0
value 0.02549
scoring_system epss
scoring_elements 0.85409
published_at 2026-04-01T12:55:00Z
1
value 0.02549
scoring_system epss
scoring_elements 0.85508
published_at 2026-04-21T12:55:00Z
2
value 0.02549
scoring_system epss
scoring_elements 0.85483
published_at 2026-04-13T12:55:00Z
3
value 0.02549
scoring_system epss
scoring_elements 0.85506
published_at 2026-04-16T12:55:00Z
4
value 0.02549
scoring_system epss
scoring_elements 0.85511
published_at 2026-04-18T12:55:00Z
5
value 0.02549
scoring_system epss
scoring_elements 0.85421
published_at 2026-04-02T12:55:00Z
6
value 0.02549
scoring_system epss
scoring_elements 0.85442
published_at 2026-04-04T12:55:00Z
7
value 0.02549
scoring_system epss
scoring_elements 0.85445
published_at 2026-04-07T12:55:00Z
8
value 0.02549
scoring_system epss
scoring_elements 0.85465
published_at 2026-04-08T12:55:00Z
9
value 0.02549
scoring_system epss
scoring_elements 0.85474
published_at 2026-04-09T12:55:00Z
10
value 0.02549
scoring_system epss
scoring_elements 0.85488
published_at 2026-04-11T12:55:00Z
11
value 0.02549
scoring_system epss
scoring_elements 0.85486
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7857
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
6
reference_url http://www.securityfocus.com/bid/97680
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97680
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444898
reference_id 1444898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444898
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7857
reference_id CVE-2017-7857
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7857
10
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
fixed_packages
0
url pkg:deb/debian/freetype@0?distro=trixie
purl pkg:deb/debian/freetype@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-7857
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yddp-8puj-dbaj
93
url VCID-yq1k-j2t6-e7g5
vulnerability_id VCID-yq1k-j2t6-e7g5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
reference_id
reference_type
scores
0
value 0.01701
scoring_system epss
scoring_elements 0.82332
published_at 2026-04-21T12:55:00Z
1
value 0.01701
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-01T12:55:00Z
2
value 0.01701
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-02T12:55:00Z
3
value 0.01701
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-04T12:55:00Z
4
value 0.01701
scoring_system epss
scoring_elements 0.82254
published_at 2026-04-07T12:55:00Z
5
value 0.01701
scoring_system epss
scoring_elements 0.8228
published_at 2026-04-08T12:55:00Z
6
value 0.01701
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-09T12:55:00Z
7
value 0.01701
scoring_system epss
scoring_elements 0.82308
published_at 2026-04-11T12:55:00Z
8
value 0.01701
scoring_system epss
scoring_elements 0.82301
published_at 2026-04-12T12:55:00Z
9
value 0.01701
scoring_system epss
scoring_elements 0.82295
published_at 2026-04-13T12:55:00Z
10
value 0.01701
scoring_system epss
scoring_elements 0.8233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
12
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
13
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
14
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625630
reference_id 625630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625630
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
reference_id CVE-2010-3053
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
47
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3053
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5
94
url VCID-ysfs-xxjz-vbep
vulnerability_id VCID-ysfs-xxjz-vbep
summary freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
reference_id
reference_type
scores
0
value 0.00798
scoring_system epss
scoring_elements 0.73965
published_at 2026-04-01T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74063
published_at 2026-04-18T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.74021
published_at 2026-04-12T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-13T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.74054
published_at 2026-04-21T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.73972
published_at 2026-04-02T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.73998
published_at 2026-04-04T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.73969
published_at 2026-04-07T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.74003
published_at 2026-04-08T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74017
published_at 2026-04-09T12:55:00Z
10
value 0.00798
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45922
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45922
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
reference_id 1763609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
reference_id CVE-2015-9382
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
purl pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2015-9382
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep
95
url VCID-zn5p-qvxr-fqhx
vulnerability_id VCID-zn5p-qvxr-fqhx
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
reference_id
reference_type
scores
0
value 0.05634
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-21T12:55:00Z
1
value 0.05634
scoring_system epss
scoring_elements 0.90305
published_at 2026-04-01T12:55:00Z
2
value 0.05634
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-02T12:55:00Z
3
value 0.05634
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-04T12:55:00Z
4
value 0.05634
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-07T12:55:00Z
5
value 0.05634
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-08T12:55:00Z
6
value 0.05634
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-09T12:55:00Z
7
value 0.05634
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-11T12:55:00Z
8
value 0.05634
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-12T12:55:00Z
9
value 0.05634
scoring_system epss
scoring_elements 0.90347
published_at 2026-04-13T12:55:00Z
10
value 0.05634
scoring_system epss
scoring_elements 0.90363
published_at 2026-04-16T12:55:00Z
11
value 0.05634
scoring_system epss
scoring_elements 0.90362
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://savannah.nongnu.org/bugs/?30644
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30644
16
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
17
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
18
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
20
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
25
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625626
reference_id 625626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625626
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
reference_id CVE-2010-2805
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
37
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
38
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
39
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2805
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx
96
url VCID-zpnw-kwqf-63bp
vulnerability_id VCID-zpnw-kwqf-63bp
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-21T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.78063
published_at 2026-04-16T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-18T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-01T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-02T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-04T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-07T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78016
published_at 2026-04-08T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-09T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-11T12:55:00Z
10
value 0.01099
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-12T12:55:00Z
11
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
reference_id CVE-2014-9747
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
fixed_packages
0
url pkg:deb/debian/freetype@2.6-1?distro=trixie
purl pkg:deb/debian/freetype@2.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-9747
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp
97
url VCID-zu7v-a14h-2ueu
vulnerability_id VCID-zu7v-a14h-2ueu
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800594
reference_id 800594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800594
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
reference_id CVE-2012-1136
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1136
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie