Lookup for vulnerable packages by Package URL.

GET /api/packages/922647?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "freetype",
    "version": "2.10.4+dfsg-1+deb11u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.10.4+dfsg-1+deb11u2",
    "latest_non_vulnerable_version": "2.14.3+dfsg-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95170?format=api",
            "vulnerability_id": "VCID-hgm7-qrp2-c3g8",
            "summary": "ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54425",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54325",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5433",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54382",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54377",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54426",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54408",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54386",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5528-1/",
                    "reference_id": "USN-5528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5528-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922675?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-31782"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgm7-qrp2-c3g8"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38514?format=api",
            "vulnerability_id": "VCID-17au-pc1k-m7at",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90103",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90106",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90122",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90138",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90152",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90151",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90146",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90163",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9662"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084",
                    "reference_id": "1191084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191084"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9662"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=api",
            "vulnerability_id": "VCID-1teu-tz69-dff8",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85892",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85816",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85838",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85857",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85881",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85879",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85874",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584",
                    "reference_id": "800584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128",
                    "reference_id": "CVE-2012-1128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1128"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=api",
            "vulnerability_id": "VCID-1ws8-ww77-ybah",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89818",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89832",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8986",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89864",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89871",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9674"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190",
                    "reference_id": "1191190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191190"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9674"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=api",
            "vulnerability_id": "VCID-2fsn-uxp3-fbeg",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587",
                    "reference_id": "800587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130",
                    "reference_id": "CVE-2012-1130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1130"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34274?format=api",
            "vulnerability_id": "VCID-2kj7-a6r9-bfft",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8815",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88109",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88134",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88136",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88137",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020238"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29640"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768",
                    "reference_id": "450768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806",
                    "reference_id": "CVE-2008-1806",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922654?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-1806"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=api",
            "vulnerability_id": "VCID-38u1-6t8n-gqey",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84163",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84195",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84196",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84218",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84224",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84242",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84236",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84233",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606",
                    "reference_id": "800606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143",
                    "reference_id": "CVE-2012-1143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1143"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61656?format=api",
            "vulnerability_id": "VCID-3h73-kffw-hfbc",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10328.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10328.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76691",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7679",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76738",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76749",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76777",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76757",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76695",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76724",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10328"
                },
                {
                    "reference_url": "http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://savannah.nongnu.org/bugs/?func=detailitem&item_id=49858"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97677"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444895",
                    "reference_id": "1444895",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444895"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-251",
                    "reference_id": "AVG-251",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-251"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-252",
                    "reference_id": "AVG-252",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-252"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10328",
                    "reference_id": "CVE-2016-10328",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10328"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3263-1/",
                    "reference_id": "USN-3263-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3263-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922670?format=api",
                    "purl": "pkg:deb/debian/freetype@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-10328"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3h73-kffw-hfbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=api",
            "vulnerability_id": "VCID-3jn7-t1f6-uyfr",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81172",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81181",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81204",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81232",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81257",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81243",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81272",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079",
                    "reference_id": "1191079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191079"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9657"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35801?format=api",
            "vulnerability_id": "VCID-3vb1-m8xt-kfcf",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88912",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88843",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88852",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88867",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88869",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88887",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88892",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88904",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88898",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3855"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42289"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42295"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43138"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?31310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?31310"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4564"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4565"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4581"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4802"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4803"
                },
                {
                    "reference_url": "http://support.avaya.com/css/P8/documents/100122733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/css/P8/documents/100122733"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2155"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:235"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0889.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/44214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/44214"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024745"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1013-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1013-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3037"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0246"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221",
                    "reference_id": "602221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275",
                    "reference_id": "645275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645275"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855",
                    "reference_id": "CVE-2010-3855",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3855"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0889",
                    "reference_id": "RHSA-2010:0889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0889"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1013-1/",
                    "reference_id": "USN-1013-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1013-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922658?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3855"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31560?format=api",
            "vulnerability_id": "VCID-3wjn-8gnc-gkhr",
            "summary": "Multiple vulnerabilities in FreeType might result in the remote execution\n    of arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"
                },
                {
                    "reference_url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
                },
                {
                    "reference_url": "http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html"
                },
                {
                    "reference_url": "http://osvdb.org/36509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/36509"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97436",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97402",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97408",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97413",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97422",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97423",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97426",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97427",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.41922",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97428",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2754"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502565"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25350"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25353"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25386"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25463",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25463"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25483"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25609"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25612"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25654"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25705"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25808"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25894",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25894"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25905",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25905"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26129"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26305"
                },
                {
                    "reference_url": "http://secunia.com/advisories/28298",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/28298"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30161"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35074"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35200"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35204"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35233"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1390"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3549"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2007/dsa-1302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2007/dsa-1302"
                },
                {
                    "reference_url": "http://www.debian.org/security/2007/dsa-1334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2007/dsa-1334"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:121"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_41_freetype2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_41_freetype2.html"
                },
                {
                    "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0403.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0403.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-1062.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/469463/100/200/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/469463/100/200/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/471286/30/6180/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/471286/30/6180/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24074"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1018088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1018088"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0019/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0019/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-466-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-466-1"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1894",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1894"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/2229",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/2229"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/0049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/0049"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1297"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200",
                    "reference_id": "240200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=240200"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625",
                    "reference_id": "425625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754",
                    "reference_id": "CVE-2007-2754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2754"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200705-22",
                    "reference_id": "GLSA-200705-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200705-22"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200707-02",
                    "reference_id": "GLSA-200707-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200707-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201006-01",
                    "reference_id": "GLSA-201006-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201006-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0403",
                    "reference_id": "RHSA-2007:0403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329",
                    "reference_id": "RHSA-2009:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062",
                    "reference_id": "RHSA-2009:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1062"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/466-1/",
                    "reference_id": "USN-466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/466-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922652?format=api",
                    "purl": "pkg:deb/debian/freetype@2.2.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-2754"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjn-8gnc-gkhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=api",
            "vulnerability_id": "VCID-3xz8-4wu5-fugq",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85773",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8568",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85717",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85762",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85755",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30263",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30263"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167",
                    "reference_id": "613167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500",
                    "reference_id": "CVE-2010-2500",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577",
                    "reference_id": "RHSA-2010:0577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0577"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2500"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37481?format=api",
            "vulnerability_id": "VCID-468g-dxsr-8yer",
            "summary": "A vulnerability in FreeType could result in execution of arbitrary\n    code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83012",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83028",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8304",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83065",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83072",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83088",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83082",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83078",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01867",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83116",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2240"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646",
                    "reference_id": "1074646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299",
                    "reference_id": "741299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201408-02",
                    "reference_id": "GLSA-201408-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201408-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2148-1/",
                    "reference_id": "USN-2148-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2148-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922664?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-2240"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35794?format=api",
            "vulnerability_id": "VCID-48rk-qwp7-j7a8",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89882",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89898",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89903",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89919",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89924",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89932",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8993",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89923",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2807"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40816"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30657"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42285"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2018"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627",
                    "reference_id": "625627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625627"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807",
                    "reference_id": "CVE-2010-2807",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2807"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2807"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=api",
            "vulnerability_id": "VCID-4wp3-qsuc-1kh9",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92792",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92754",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92765",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92772",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92782",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9278",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09383",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92781",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2806"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40816"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30656"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42285"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2018"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980",
                    "reference_id": "621980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621980"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806",
                    "reference_id": "CVE-2010-2806",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736",
                    "reference_id": "RHSA-2010:0736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737",
                    "reference_id": "RHSA-2010:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864",
                    "reference_id": "RHSA-2010:0864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2806"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=api",
            "vulnerability_id": "VCID-57th-r73p-a3fy",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127912955808467&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127912955808467&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84848",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84752",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84767",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84786",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84788",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84817",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84832",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02329",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84827",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527"
                },
                {
                    "reference_url": "http://savannah.nongnu.org/bugs/?30054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://savannah.nongnu.org/bugs/?30054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557",
                    "reference_id": "614557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527",
                    "reference_id": "CVE-2010-2527",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577",
                    "reference_id": "RHSA-2010:0577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0577"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2527"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=api",
            "vulnerability_id": "VCID-5rpx-8t3t-syhv",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598",
                    "reference_id": "800598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139",
                    "reference_id": "CVE-2012-1139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1139"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90673?format=api",
            "vulnerability_id": "VCID-5z69-3ht1-kfeh",
            "summary": "CVE-2007-3506 Emboldden rendering  with a sbit font makes glibc detected.",
            "references": [
                {
                    "reference_url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72998",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72901",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72909",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7293",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72905",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72956",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72982",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72957",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3506"
                },
                {
                    "reference_url": "http://savannah.nongnu.org/bugs/index.php?19536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://savannah.nongnu.org/bugs/index.php?19536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25884"
                },
                {
                    "reference_url": "https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/24708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/24708"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=235479",
                    "reference_id": "235479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235479"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013",
                    "reference_id": "432013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3506",
                    "reference_id": "CVE-2007-3506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3506"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922653?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-3506"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5z69-3ht1-kfeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=api",
            "vulnerability_id": "VCID-613j-8z2t-t3au",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585",
                    "reference_id": "800585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129",
                    "reference_id": "CVE-2012-1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1129"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35800?format=api",
            "vulnerability_id": "VCID-64dt-nnzb-mkfc",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90373",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90317",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9032",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90332",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90336",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90349",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90356",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90364",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90357",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43138"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://security-tracker.debian.org/tracker/CVE-2010-3814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security-tracker.debian.org/tracker/CVE-2010-3814"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4581"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2155"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:236"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/44643",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/44643"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024767"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1013-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1013-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0246"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221",
                    "reference_id": "602221",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814",
                    "reference_id": "CVE-2010-3814",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3814"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1013-1/",
                    "reference_id": "USN-1013-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1013-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922658?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3814"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64393?format=api",
            "vulnerability_id": "VCID-6fzj-746j-bkbc",
            "summary": "Freetype: Freetype: Information disclosure or denial of service via specially crafted font files",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23865.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23865.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23865",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02445",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02986",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0305",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03053",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03077",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03041",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03009",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23865"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1129606",
                    "reference_id": "1129606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1129606"
                },
                {
                    "reference_url": "https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/",
                    "reference_id": "2.14.2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/"
                        }
                    ],
                    "url": "https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443891",
                    "reference_id": "2443891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443891"
                },
                {
                    "reference_url": "https://www.facebook.com/security/advisories/cve-2026-23865",
                    "reference_id": "cve-2026-23865",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/"
                        }
                    ],
                    "url": "https://www.facebook.com/security/advisories/cve-2026-23865"
                },
                {
                    "reference_url": "https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c",
                    "reference_id": "fc85a255849229c024c8e65f536fe1875d84841c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-02T16:25:34Z/"
                        }
                    ],
                    "url": "https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8086-1/",
                    "reference_id": "USN-8086-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8086-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922670?format=api",
                    "purl": "pkg:deb/debian/freetype@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922678?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-23865"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzj-746j-bkbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=api",
            "vulnerability_id": "VCID-6pzj-1sgf-zbbr",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87597",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87606",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8762",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87622",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87659",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87652",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607",
                    "reference_id": "800607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144",
                    "reference_id": "CVE-2012-1144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1144"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=api",
            "vulnerability_id": "VCID-6xf8-49hw-hfaf",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66463",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66502",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66527",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66499",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66547",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66561",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66536",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66572",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965",
                    "reference_id": "1429965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971",
                    "reference_id": "856971",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3237-1/",
                    "reference_id": "USN-3237-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3237-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922669?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.3-3.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-10244"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=api",
            "vulnerability_id": "VCID-6z8y-k8vw-nudd",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89672",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89619",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89635",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89652",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89658",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89657",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604",
                    "reference_id": "800604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142",
                    "reference_id": "CVE-2012-1142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1142"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=api",
            "vulnerability_id": "VCID-73d5-ezt5-87eh",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85558",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85571",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85588",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85612",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85624",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85637",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8563",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85653",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085",
                    "reference_id": "1191085",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191085"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9663"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=api",
            "vulnerability_id": "VCID-73e1-scax-8ugj",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8405",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84063",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8408",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84105",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84111",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84129",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84123",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84119",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84141",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9675"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192",
                    "reference_id": "1191192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191192"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9675"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35799?format=api",
            "vulnerability_id": "VCID-7698-fwj1-fufd",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8788",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87867",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87866",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8782",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87831",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87835",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87863",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03648",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04785",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89433",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2116"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:201"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/43700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/43700"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1013-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1013-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625",
                    "reference_id": "623625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=623625"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311",
                    "reference_id": "CVE-2010-3311",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3311"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736",
                    "reference_id": "RHSA-2010:0736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737",
                    "reference_id": "RHSA-2010:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864",
                    "reference_id": "RHSA-2010:0864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1013-1/",
                    "reference_id": "USN-1013-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1013-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3311"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35802?format=api",
            "vulnerability_id": "VCID-79js-ywyp-x3au",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93274",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93289",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93296",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93305",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93303",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93304",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10653",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93322",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0226"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871",
                    "reference_id": "635871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701",
                    "reference_id": "722701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=722701"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1085",
                    "reference_id": "RHSA-2011:1085",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1085"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1173-1/",
                    "reference_id": "USN-1173-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1173-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922659?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-0226"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88870?format=api",
            "vulnerability_id": "VCID-7jyc-psvy-hkgh",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93946",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93955",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93958",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93966",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9397",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93973",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93988",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618110",
                    "reference_id": "1618110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618110"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt",
                    "reference_id": "CVE-2006-2661;OSVDB-26033",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/18329/info",
                    "reference_id": "CVE-2006-2661;OSVDB-26033",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/18329/info"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500",
                    "reference_id": "RHSA-2006:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/291-1/",
                    "reference_id": "USN-291-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/291-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922646?format=api",
                    "purl": "pkg:deb/debian/freetype@2.2.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-2661"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyc-psvy-hkgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61659?format=api",
            "vulnerability_id": "VCID-92gd-8jxd-qbbg",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7864.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7864.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83851",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83944",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83912",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83928",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83923",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83919",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8388",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83905",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7864"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=509"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97673"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444911",
                    "reference_id": "1444911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444911"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7864",
                    "reference_id": "CVE-2017-7864",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7864"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922670?format=api",
                    "purl": "pkg:deb/debian/freetype@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7864"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92gd-8jxd-qbbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=api",
            "vulnerability_id": "VCID-a9r6-k8gp-nbfs",
            "summary": "freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85895",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8598",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85968",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85966",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85961",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85906",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85925",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85944",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85954",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?46346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?46346"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613",
                    "reference_id": "1763613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383",
                    "reference_id": "CVE-2015-9383",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-1/",
                    "reference_id": "USN-4126-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-2/",
                    "reference_id": "USN-4126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922668?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-9383"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=api",
            "vulnerability_id": "VCID-ahxa-yjxp-a7en",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87399",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8734",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87356",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87393",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87388",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87384",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30248",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30248"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30249"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162",
                    "reference_id": "613162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499",
                    "reference_id": "CVE-2010-2499",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2499"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=api",
            "vulnerability_id": "VCID-ask2-xeb7-7qbk",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86989",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87019",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87012",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87032",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8704",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87053",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87048",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87042",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87058",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094",
                    "reference_id": "1191094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191094"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9671"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=api",
            "vulnerability_id": "VCID-b35u-t7u2-sudy",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74764",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74736",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74727",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74684",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74687",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7472",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74734",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74757",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?41309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?41309"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3370"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373",
                    "reference_id": "1262373",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619",
                    "reference_id": "798619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746",
                    "reference_id": "CVE-2014-9746",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922666?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9746"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35782?format=api",
            "vulnerability_id": "VCID-bt31-xk8r-8qd2",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84046",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83983",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83987",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84033",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84026",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84022",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30082",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30082"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30083"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154",
                    "reference_id": "613154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613154"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497",
                    "reference_id": "CVE-2010-2497",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2497"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2497"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31559?format=api",
            "vulnerability_id": "VCID-cvba-wjra-wye9",
            "summary": "Multiple vulnerabilities in FreeType might result in the remote execution\n    of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92343",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9235",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92356",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9236",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92371",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92376",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92382",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08522",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92394",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437",
                    "reference_id": "484437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=484437"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200607-02",
                    "reference_id": "GLSA-200607-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200607-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200710-09",
                    "reference_id": "GLSA-200710-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200710-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201006-01",
                    "reference_id": "GLSA-201006-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201006-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500",
                    "reference_id": "RHSA-2006:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329",
                    "reference_id": "RHSA-2009:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062",
                    "reference_id": "RHSA-2009:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1062"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/291-1/",
                    "reference_id": "USN-291-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/291-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922646?format=api",
                    "purl": "pkg:deb/debian/freetype@2.2.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-1861"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvba-wjra-wye9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=api",
            "vulnerability_id": "VCID-cwfg-1d6f-hfgg",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=128110167119337&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=128110167119337&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91995",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91953",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91959",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91972",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91977",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9198",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91979",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91976",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2808"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40816"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30658"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42285"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2018"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907",
                    "reference_id": "621907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621907"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808",
                    "reference_id": "CVE-2010-2808",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737",
                    "reference_id": "RHSA-2010:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864",
                    "reference_id": "RHSA-2010:0864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2808"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=api",
            "vulnerability_id": "VCID-d2v4-gm58-uyby",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600",
                    "reference_id": "800600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140",
                    "reference_id": "CVE-2012-1140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1140"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=api",
            "vulnerability_id": "VCID-dcxj-zzfj-3bg7",
            "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35967",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35828",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35878",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35901",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35907",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35881",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183",
                    "reference_id": "1010183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985",
                    "reference_id": "2077985",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-06",
                    "reference_id": "GLSA-202402-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745",
                    "reference_id": "RHSA-2022:7745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340",
                    "reference_id": "RHSA-2022:8340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8340"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420",
                    "reference_id": "RHSA-2024:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0420"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5453-1/",
                    "reference_id": "USN-5453-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5453-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5528-1/",
                    "reference_id": "USN-5528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5528-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7352-2/",
                    "reference_id": "USN-7352-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7352-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922674?format=api",
                    "purl": "pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27406"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=api",
            "vulnerability_id": "VCID-edag-8pt8-jqdw",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595",
                    "reference_id": "800595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137",
                    "reference_id": "CVE-2012-1137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1137"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=api",
            "vulnerability_id": "VCID-ettc-tamy-kfcf",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87597",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87606",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8762",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87622",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87659",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87652",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591",
                    "reference_id": "800591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133",
                    "reference_id": "CVE-2012-1133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1133"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=api",
            "vulnerability_id": "VCID-ewj8-a9c8-w3dy",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87597",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87606",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8762",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87622",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87659",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87652",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593",
                    "reference_id": "800593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135",
                    "reference_id": "CVE-2012-1135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1135"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46225?format=api",
            "vulnerability_id": "VCID-f9ym-em5n-87ep",
            "summary": "Multiple integer overflows in FreeType might allow for the remote execution\n    of arbitrary code or a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94827",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94836",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9484",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94842",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9486",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94864",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94872",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384",
                    "reference_id": "491384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925",
                    "reference_id": "524925",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200905-05",
                    "reference_id": "GLSA-200905-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200905-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201412-08",
                    "reference_id": "GLSA-201412-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201412-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329",
                    "reference_id": "RHSA-2009:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0329"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1061",
                    "reference_id": "RHSA-2009:1061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1061"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062",
                    "reference_id": "RHSA-2009:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1062"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/767-1/",
                    "reference_id": "USN-767-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/767-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922655?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.9-4.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.9-4.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-0946"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=api",
            "vulnerability_id": "VCID-fp2p-5ymf-wffj",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8511",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8514",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85144",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85166",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85174",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85188",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85186",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85183",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85204",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092",
                    "reference_id": "1191092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191092"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9669"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=api",
            "vulnerability_id": "VCID-gcht-dzky-fbay",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88277",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88229",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88235",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8826",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03893",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88263",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3054"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0736.html"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0737.html"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42621"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632",
                    "reference_id": "625632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625632"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054",
                    "reference_id": "CVE-2010-3054",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3054"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0736",
                    "reference_id": "RHSA-2010:0736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0737",
                    "reference_id": "RHSA-2010:0737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0737"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3054"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35803?format=api",
            "vulnerability_id": "VCID-gcr7-xxtw-e3bs",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85299",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85311",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85331",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85353",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85362",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85376",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85374",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02511",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85371",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87114",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3256"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120",
                    "reference_id": "646120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226",
                    "reference_id": "746226",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746226"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1402",
                    "reference_id": "RHSA-2011:1402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094",
                    "reference_id": "RHSA-2012:0094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0094"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1267-1/",
                    "reference_id": "USN-1267-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1267-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922660?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3256"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=api",
            "vulnerability_id": "VCID-gmk4-9sks-s3a5",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88809",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88837",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88854",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88859",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88871",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88818",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04622",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04622",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89269",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04622",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89282",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342",
                    "reference_id": "617342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541",
                    "reference_id": "CVE-2010-2541",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577",
                    "reference_id": "RHSA-2010:0577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0577"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2541"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38523?format=api",
            "vulnerability_id": "VCID-gtka-sbgw-tuf5",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88852",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8886",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88876",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88878",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88908",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88921",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9665"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087",
                    "reference_id": "1191087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191087"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9665"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=api",
            "vulnerability_id": "VCID-h7qy-dusf-tqb7",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602",
                    "reference_id": "800602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141",
                    "reference_id": "CVE-2012-1141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1141"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=api",
            "vulnerability_id": "VCID-hgkz-p83z-ybfe",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583",
                    "reference_id": "800583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127",
                    "reference_id": "CVE-2012-1127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1127"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=api",
            "vulnerability_id": "VCID-hutw-rk7x-5bc3",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84869",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84887",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8637",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86349",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86359",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02908",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86373",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377",
                    "reference_id": "1262377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620",
                    "reference_id": "798620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2739-1/",
                    "reference_id": "USN-2739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922666?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9745"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=api",
            "vulnerability_id": "VCID-jg4p-nv1j-fyb9",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89732",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89746",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89765",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89772",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89778",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8977",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89786",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093",
                    "reference_id": "1191093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191093"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9670"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38501?format=api",
            "vulnerability_id": "VCID-jn9w-2axj-8ke5",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86198",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86221",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86222",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86252",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02866",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86275",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9659"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081",
                    "reference_id": "1191081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191081"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084",
                    "reference_id": "773084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9659"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=api",
            "vulnerability_id": "VCID-jwbe-5wmu-uqgp",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589",
                    "reference_id": "800589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131",
                    "reference_id": "CVE-2012-1131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1131"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61658?format=api",
            "vulnerability_id": "VCID-k8ba-gmc8-qfc4",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7858.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7858.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85016",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85111",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85095",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85093",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8509",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85028",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85045",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85072",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85079",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7858"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=738"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97682",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97682"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444904",
                    "reference_id": "1444904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444904"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7858",
                    "reference_id": "CVE-2017-7858",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7858"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922670?format=api",
                    "purl": "pkg:deb/debian/freetype@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7858"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8ba-gmc8-qfc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88869?format=api",
            "vulnerability_id": "VCID-kdfa-8q7m-2kbk",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97606",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97612",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97615",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97623",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97628",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97629",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.45933",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97636",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618019",
                    "reference_id": "1618019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618019"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt",
                    "reference_id": "CVE-2006-0747;OSVDB-26032",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/18326/info",
                    "reference_id": "CVE-2006-0747;OSVDB-26032",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/18326/info"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500",
                    "reference_id": "RHSA-2006:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/291-1/",
                    "reference_id": "USN-291-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/291-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922646?format=api",
                    "purl": "pkg:deb/debian/freetype@2.2.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-0747"
            ],
            "risk_score": 0.8,
            "exploitability": "2.0",
            "weighted_severity": "0.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdfa-8q7m-2kbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=api",
            "vulnerability_id": "VCID-m8ha-zxb7-tyg6",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81728",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81831",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8176",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81792",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81811",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81799",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81762",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3839"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/99093"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500",
                    "reference_id": "1446500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220",
                    "reference_id": "861220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201705-10",
                    "reference_id": "ASA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201705-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201705-7",
                    "reference_id": "ASA-201705-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201705-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-257",
                    "reference_id": "AVG-257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-257"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-258",
                    "reference_id": "AVG-258",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-258"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105",
                    "reference_id": "CVE-2017-8105",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3282-1/",
                    "reference_id": "USN-3282-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3282-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3282-2/",
                    "reference_id": "USN-3282-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3282-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922671?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-8105"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=api",
            "vulnerability_id": "VCID-mv93-73qb-ekgt",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86514",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86462",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02967",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86498",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590",
                    "reference_id": "800590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132",
                    "reference_id": "CVE-2012-1132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1132"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=api",
            "vulnerability_id": "VCID-n99m-fgj7-y3bk",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87597",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87606",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8762",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87622",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87648",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87659",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87652",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597",
                    "reference_id": "800597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138",
                    "reference_id": "CVE-2012-1138",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1138"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=api",
            "vulnerability_id": "VCID-nakp-vmxa-akey",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78458",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78464",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78478",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78504",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78516",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78509",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78537",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086",
                    "reference_id": "1191086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191086"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9664"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38533?format=api",
            "vulnerability_id": "VCID-nfp7-sjcv-wkfv",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82336",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8235",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82368",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82391",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82414",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82444",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091",
                    "reference_id": "1191091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191091"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9668"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=api",
            "vulnerability_id": "VCID-nn4w-gq71-kfgd",
            "summary": "freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65886",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65927",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65958",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66006",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65993",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65962",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65997",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802",
                    "reference_id": "1741802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922667?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-9290"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=api",
            "vulnerability_id": "VCID-nx21-ks3v-53e4",
            "summary": "Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.92905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99772",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.92905",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99771",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.92931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.92931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99773",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html"
                },
                {
                    "reference_url": "https://crbug.com/1139963",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://crbug.com/1139963"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2020/Nov/33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2020/Nov/33"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/cefsharp/CefSharp",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/cefsharp/CefSharp"
                },
                {
                    "reference_url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202011-12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202011-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-19",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-19"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240812-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240812-0001"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4824"
                },
                {
                    "reference_url": "https://www.nuget.org/packages/CefSharp.Common",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.nuget.org/packages/CefSharp.Common"
                },
                {
                    "reference_url": "https://www.nuget.org/packages/CefSharp.WinForms",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.nuget.org/packages/CefSharp.WinForms"
                },
                {
                    "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.nuget.org/packages/CefSharp.Wpf"
                },
                {
                    "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210",
                    "reference_id": "1890210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586",
                    "reference_id": "972586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202010-10",
                    "reference_id": "ASA-202010-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202010-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202010-11",
                    "reference_id": "ASA-202010-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202010-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-12",
                    "reference_id": "ASA-202011-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1254",
                    "reference_id": "AVG-1254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1254"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1255",
                    "reference_id": "AVG-1255",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1255"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1279",
                    "reference_id": "AVG-1279",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1279"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62",
                    "reference_id": "GHSA-pv36-h7jh-qm62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202010-07",
                    "reference_id": "GLSA-202010-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202010-07"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/",
                    "reference_id": "J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50",
                    "reference_id": "mfsa2020-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51",
                    "reference_id": "mfsa2020-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52",
                    "reference_id": "mfsa2020-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4351",
                    "reference_id": "RHSA-2020:4351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4351"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4907",
                    "reference_id": "RHSA-2020:4907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4949",
                    "reference_id": "RHSA-2020:4949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4949"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4950",
                    "reference_id": "RHSA-2020:4950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4951",
                    "reference_id": "RHSA-2020:4951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4952",
                    "reference_id": "RHSA-2020:4952",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4952"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4593-1/",
                    "reference_id": "USN-4593-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4593-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4593-2/",
                    "reference_id": "USN-4593-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4593-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922673?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.2%2Bdfsg-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.2%252Bdfsg-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-15999",
                "GHSA-pv36-h7jh-qm62"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=api",
            "vulnerability_id": "VCID-p2yw-ksc4-jfe9",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89501",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89505",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89517",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89533",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89537",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89544",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89542",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04849",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8955",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082",
                    "reference_id": "1191082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191082"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9660"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=api",
            "vulnerability_id": "VCID-p8h9-9xku-hbhv",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80537",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80544",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80566",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80558",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80614",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.806",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80622",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089",
                    "reference_id": "1191089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191089"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9666"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=api",
            "vulnerability_id": "VCID-pznp-81q7-z3d4",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81172",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81181",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81204",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81232",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81257",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81243",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01518",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81272",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080",
                    "reference_id": "1191080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191080"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9658"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=api",
            "vulnerability_id": "VCID-pzsb-3h3d-t7hq",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85773",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8568",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85717",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85747",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85762",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02649",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85755",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30106"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160",
                    "reference_id": "613160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498",
                    "reference_id": "CVE-2010-2498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2498"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44715?format=api",
            "vulnerability_id": "VCID-qn37-kjm4-tbap",
            "summary": "A vulnerability has been discovered in FreeType allowing for user-assisted\n    remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://issues.foresightlinux.org/browse/FL-223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://issues.foresightlinux.org/browse/FL-223"
                },
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1351",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91975",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91916",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91924",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91938",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91959",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1351"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24745"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24756"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24758"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24765"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24768"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24770"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24772"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24776"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24791"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24885"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24889"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24921"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24996",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24996"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25004"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25006"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25096"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25195"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25216"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25305"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25495"
                },
                {
                    "reference_url": "http://secunia.com/advisories/28333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/28333"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30161"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200705-02.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200705-02.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200705-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200705-10.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1213"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=498954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?release_id=498954"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm"
                },
                {
                    "reference_url": "http://www.debian.org/security/2007/dsa-1294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2007/dsa-1294"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1454"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_27_x.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_27_x.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata39.html#021_xorg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata39.html#021_xorg"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata40.html#011_xorg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata40.html#011_xorg"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0132.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0132.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0150.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0150.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/23283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/23283"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/23300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/23300"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/23402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/23402"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1017857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1017857"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2007/0013/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2007/0013/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-448-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-448-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1217"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1264",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1264"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1548"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=235265",
                    "reference_id": "235265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=235265"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771",
                    "reference_id": "426771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1351",
                    "reference_id": "CVE-2007-1351",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1351"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200705-02",
                    "reference_id": "GLSA-200705-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200705-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200705-10",
                    "reference_id": "GLSA-200705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200705-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0125",
                    "reference_id": "RHSA-2007:0125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0125"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0126",
                    "reference_id": "RHSA-2007:0126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0132",
                    "reference_id": "RHSA-2007:0132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0132"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0150",
                    "reference_id": "RHSA-2007:0150",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0150"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/448-1/",
                    "reference_id": "USN-448-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/448-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922651?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-1351"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qn37-kjm4-tbap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36612?format=api",
            "vulnerability_id": "VCID-qu13-pxwm-d3da",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86453",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86482",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86481",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86501",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86511",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86526",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02977",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86517",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51826"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51900"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?37907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?37907"
                },
                {
                    "reference_url": "http://www.freetype.org/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.freetype.org/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027921"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1686-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1686-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691",
                    "reference_id": "696691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094",
                    "reference_id": "890094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890094"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670",
                    "reference_id": "CVE-2012-5670",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5670"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-16",
                    "reference_id": "GLSA-201402-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1686-1/",
                    "reference_id": "USN-1686-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1686-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922663?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5670"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34278?format=api",
            "vulnerability_id": "VCID-rcck-xn4c-k3at",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8566",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85565",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85577",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8562",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85644",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85641",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85637",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35204"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020240"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29637"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29639"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774",
                    "reference_id": "450774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808",
                    "reference_id": "CVE-2008-1808",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329",
                    "reference_id": "RHSA-2009:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0329"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922654?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-1808"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=api",
            "vulnerability_id": "VCID-s148-7tzs-gfg8",
            "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2594",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25982",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25749",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25872",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25882",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25841",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25788",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183",
                    "reference_id": "1010183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991",
                    "reference_id": "2077991",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-06",
                    "reference_id": "GLSA-202402-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745",
                    "reference_id": "RHSA-2022:7745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340",
                    "reference_id": "RHSA-2022:8340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8340"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420",
                    "reference_id": "RHSA-2024:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0420"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5528-1/",
                    "reference_id": "USN-5528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5528-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922674?format=api",
                    "purl": "pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27405"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51301?format=api",
            "vulnerability_id": "VCID-s3f6-paas-vye4",
            "summary": "A buffer overflow was discovered in the PCF font parser, potentially\n    resulting in the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92432",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9245",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92461",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92466",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92472",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92475",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92473",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92483",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3467"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920",
                    "reference_id": "379920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353",
                    "reference_id": "383353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=487070",
                    "reference_id": "487070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=487070"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200609-04",
                    "reference_id": "GLSA-200609-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200609-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0500",
                    "reference_id": "RHSA-2006:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0634",
                    "reference_id": "RHSA-2006:0634",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0634"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0635",
                    "reference_id": "RHSA-2006:0635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0635"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/324-1/",
                    "reference_id": "USN-324-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/324-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/341-1/",
                    "reference_id": "USN-341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922650?format=api",
                    "purl": "pkg:deb/debian/freetype@2.2.1-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-3467"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3f6-paas-vye4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36611?format=api",
            "vulnerability_id": "VCID-s9u5-4nwv-vudq",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0216.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82249",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82142",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82155",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82173",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.822",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82226",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82219",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82213",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51826"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51900"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?37906",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?37906"
                },
                {
                    "reference_url": "http://www.freetype.org/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.freetype.org/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027921"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1686-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1686-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691",
                    "reference_id": "696691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088",
                    "reference_id": "890088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890088"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669",
                    "reference_id": "CVE-2012-5669",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5669"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-16",
                    "reference_id": "GLSA-201402-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0216",
                    "reference_id": "RHSA-2013:0216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1686-1/",
                    "reference_id": "USN-1686-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1686-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922663?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5669"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=api",
            "vulnerability_id": "VCID-th47-m45d-m7dk",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83727",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8374",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83754",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83756",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83786",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83802",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83796",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83825",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090",
                    "reference_id": "1191090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191090"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9667"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86356?format=api",
            "vulnerability_id": "VCID-tmb5-g2ua-ekek",
            "summary": "freetype: OOB stack-based read/write in cf2_hintmap_build()",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69893",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69906",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6992",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69898",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69946",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69962",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6997",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69957",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646",
                    "reference_id": "1074646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1074646"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299",
                    "reference_id": "741299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2148-1/",
                    "reference_id": "USN-2148-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2148-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922664?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-2241"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=api",
            "vulnerability_id": "VCID-tsw4-kqbc-kqf1",
            "summary": "freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.722",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72285",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72272",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72256",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72242",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72205",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72225",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72201",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72237",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72249",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?45955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?45955"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788",
                    "reference_id": "1752788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381",
                    "reference_id": "CVE-2015-9381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254",
                    "reference_id": "RHSA-2019:4254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4254"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-2/",
                    "reference_id": "USN-4126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922667?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-9381"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=api",
            "vulnerability_id": "VCID-tu7r-tsp8-73ew",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88707",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88717",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88732",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88734",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88751",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88768",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88763",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88776",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096",
                    "reference_id": "1191096",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191096"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9673"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34276?format=api",
            "vulnerability_id": "VCID-txkg-jsdf-93e6",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90071",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90013",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90062",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9006",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90055",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020239"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29641"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773",
                    "reference_id": "450773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807",
                    "reference_id": "CVE-2008-1807",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922654?format=api",
                    "purl": "pkg:deb/debian/freetype@2.3.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-1807"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35789?format=api",
            "vulnerability_id": "VCID-tyhk-9jvd-y7bj",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86918",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86858",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86877",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86871",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86912",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86908",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86902",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2520"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30361"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198",
                    "reference_id": "613198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613198"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520",
                    "reference_id": "CVE-2010-2520",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2520"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2520"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=api",
            "vulnerability_id": "VCID-u15r-u7zz-17ad",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89322",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89327",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89339",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89341",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89362",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89371",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89368",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89364",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095",
                    "reference_id": "1191095",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191095"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9672"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=api",
            "vulnerability_id": "VCID-uh3u-pzzg-fkgg",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89613",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89644",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89649",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89655",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89648",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04948",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89664",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083",
                    "reference_id": "1191083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191083"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0696",
                    "reference_id": "RHSA-2015:0696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9661"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=api",
            "vulnerability_id": "VCID-uhnk-v91u-p7e5",
            "summary": "Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85191",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85209",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8521",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85232",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8524",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85255",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85253",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02464",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8527",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078",
                    "reference_id": "1191078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191078"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656",
                    "reference_id": "777656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-05",
                    "reference_id": "GLSA-201503-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2510-1/",
                    "reference_id": "USN-2510-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2510-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922665?format=api",
                    "purl": "pkg:deb/debian/freetype@2.5.2-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9656"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=api",
            "vulnerability_id": "VCID-uy24-k7je-pyhr",
            "summary": "A vulnerability has been discovered in FreeType, which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.63439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98416",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.63439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98411",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.64976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98459",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.64976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98462",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.64976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.64976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98467",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.64976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98468",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357",
                    "reference_id": "2351357",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202505-11",
                    "reference_id": "ASA-202505-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202505-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2877",
                    "reference_id": "AVG-2877",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2877"
                },
                {
                    "reference_url": "https://www.facebook.com/security/advisories/cve-2025-27363",
                    "reference_id": "cve-2025-27363",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/"
                        }
                    ],
                    "url": "https://www.facebook.com/security/advisories/cve-2025-27363"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-07",
                    "reference_id": "GLSA-202505-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3382",
                    "reference_id": "RHSA-2025:3382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3382"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3383",
                    "reference_id": "RHSA-2025:3383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3384",
                    "reference_id": "RHSA-2025:3384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3385",
                    "reference_id": "RHSA-2025:3385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3385"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3386",
                    "reference_id": "RHSA-2025:3386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3387",
                    "reference_id": "RHSA-2025:3387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3393",
                    "reference_id": "RHSA-2025:3393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3395",
                    "reference_id": "RHSA-2025:3395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3407",
                    "reference_id": "RHSA-2025:3407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3407"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3421",
                    "reference_id": "RHSA-2025:3421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3421"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8195",
                    "reference_id": "RHSA-2025:8195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8219",
                    "reference_id": "RHSA-2025:8219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8253",
                    "reference_id": "RHSA-2025:8253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8292",
                    "reference_id": "RHSA-2025:8292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9380",
                    "reference_id": "RHSA-2025:9380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9380"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7352-1/",
                    "reference_id": "USN-7352-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7352-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7352-2/",
                    "reference_id": "USN-7352-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7352-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922676?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922677?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-27363"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35804?format=api",
            "vulnerability_id": "VCID-v6um-wgpt-myax",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91075",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91081",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91089",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91098",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91111",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91116",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91124",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91125",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91148",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3439"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122",
                    "reference_id": "649122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799",
                    "reference_id": "753799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753799"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1455",
                    "reference_id": "RHSA-2011:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0094",
                    "reference_id": "RHSA-2012:0094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0094"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1267-1/",
                    "reference_id": "USN-1267-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1267-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922661?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.8-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3439"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35781?format=api",
            "vulnerability_id": "VCID-vykx-mb8e-hyfv",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html"
                },
                {
                    "reference_url": "http://osvdb.org/66828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/66828"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98242",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98245",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98248",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98253",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98254",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.5972",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98257",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1797"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40807"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40816"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60856"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4291"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4292",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4292"
                },
                {
                    "reference_url": "http://www.exploit-db.com/exploits/14538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.exploit-db.com/exploits/14538"
                },
                {
                    "reference_url": "http://www.f-secure.com/weblog/archives/00002002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.f-secure.com/weblog/archives/00002002.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42151"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2018"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144",
                    "reference_id": "621144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621144"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797",
                    "reference_id": "CVE-2010-1797",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1797"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py",
                    "reference_id": "CVE-2010-1797;OSVDB-66828",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt",
                    "reference_id": "CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0607",
                    "reference_id": "RHSA-2010:0607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0607"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-1797"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=api",
            "vulnerability_id": "VCID-wapu-grak-1bca",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90517",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90531",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90538",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90556",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90558",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592",
                    "reference_id": "800592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134",
                    "reference_id": "CVE-2012-1134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1134"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=api",
            "vulnerability_id": "VCID-wbve-vpw4-tqhe",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89105",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89114",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89128",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89131",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89154",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89164",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8916",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0452",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89157",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024266"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30306"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2070"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-963-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-963-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194",
                    "reference_id": "613194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519",
                    "reference_id": "CVE-2010-2519",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578",
                    "reference_id": "RHSA-2010:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0578"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/963-1/",
                    "reference_id": "USN-963-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/963-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922657?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2519"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=api",
            "vulnerability_id": "VCID-wr9p-x4sm-aqdh",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73951",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74039",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73955",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73989",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74002",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74024",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74006",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73984",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3839"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/99091"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073",
                    "reference_id": "1446073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308",
                    "reference_id": "861308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201705-10",
                    "reference_id": "ASA-201705-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201705-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201705-7",
                    "reference_id": "ASA-201705-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201705-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-257",
                    "reference_id": "AVG-257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-257"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-258",
                    "reference_id": "AVG-258",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-258"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287",
                    "reference_id": "CVE-2017-8287",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3282-1/",
                    "reference_id": "USN-3282-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3282-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3282-2/",
                    "reference_id": "USN-3282-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3282-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922671?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.3-3.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-8287"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=api",
            "vulnerability_id": "VCID-xb9q-dk8j-fbch",
            "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31668",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31584",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31614",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31574",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183",
                    "reference_id": "1010183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989",
                    "reference_id": "2077989",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-06",
                    "reference_id": "GLSA-202402-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745",
                    "reference_id": "RHSA-2022:7745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340",
                    "reference_id": "RHSA-2022:8340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8340"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420",
                    "reference_id": "RHSA-2024:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0420"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5528-1/",
                    "reference_id": "USN-5528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5528-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922674?format=api",
                    "purl": "pkg:deb/debian/freetype@2.11.1%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.11.1%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27404"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=api",
            "vulnerability_id": "VCID-xe45-fv7j-4ucr",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86805",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86727",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86738",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86757",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86775",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86784",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86797",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86794",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8679",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581",
                    "reference_id": "800581",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126",
                    "reference_id": "CVE-2012-1126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1126"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36610?format=api",
            "vulnerability_id": "VCID-xyay-hhmw-cyb1",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8616",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86077",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86087",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86104",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86103",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86122",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86133",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86148",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86146",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86142",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51826"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51900"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?37905",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?37905"
                },
                {
                    "reference_url": "http://www.freetype.org/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.freetype.org/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/12/25/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/12/25/2"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027921",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027921"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1686-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1686-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691",
                    "reference_id": "696691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087",
                    "reference_id": "890087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890087"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668",
                    "reference_id": "CVE-2012-5668",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5668"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-16",
                    "reference_id": "GLSA-201402-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1686-1/",
                    "reference_id": "USN-1686-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1686-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922663?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5668"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=api",
            "vulnerability_id": "VCID-y4qf-qfbv-mqdg",
            "summary": "freetype: NULL pointer dereference in the Ins_GETVARIATION() function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00197",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41695",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49131",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4916",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49113",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49167",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49164",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49181",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49155",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00258",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49098",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771",
                    "reference_id": "1544771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450",
                    "reference_id": "890450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-3",
                    "reference_id": "ASA-201805-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-613",
                    "reference_id": "AVG-613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-613"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3572-1/",
                    "reference_id": "USN-3572-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3572-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922672?format=api",
                    "purl": "pkg:deb/debian/freetype@2.9.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-6942"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61657?format=api",
            "vulnerability_id": "VCID-yddp-8puj-dbaj",
            "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf47fc0775cc9705673caf0c47a81f94b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf47fc0775cc9705673caf0c47a81f94b"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7857.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7857.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85409",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85488",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85486",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85483",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85421",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85442",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85445",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85465",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85474",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7857"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=759"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97680"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444898",
                    "reference_id": "1444898",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444898"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7857",
                    "reference_id": "CVE-2017-7857",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7857"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-14",
                    "reference_id": "GLSA-201706-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922670?format=api",
                    "purl": "pkg:deb/debian/freetype@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7857"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yddp-8puj-dbaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35797?format=api",
            "vulnerability_id": "VCID-yq1k-j2t6-e7g5",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8233",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82226",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82239",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82259",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8228",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82288",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82308",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82301",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82295",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3053"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630",
                    "reference_id": "625630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625630"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053",
                    "reference_id": "CVE-2010-3053",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3053"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3053"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=api",
            "vulnerability_id": "VCID-ysfs-xxjz-vbep",
            "summary": "freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74054",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74039",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74021",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74014",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73998",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73969",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74003",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00798",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74017",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?45922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?45922"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609",
                    "reference_id": "1763609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382",
                    "reference_id": "CVE-2015-9382",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140",
                    "reference_id": "RHSA-2018:3140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254",
                    "reference_id": "RHSA-2019:4254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4254"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4126-2/",
                    "reference_id": "USN-4126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4126-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922667?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6.1-0.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.1-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-9382"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35792?format=api",
            "vulnerability_id": "VCID-zn5p-qvxr-fqhx",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"
                },
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"
                },
                {
                    "reference_url": "http://marc.info/?l=oss-security&m=128111955616772&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=oss-security&m=128111955616772&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90363",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90305",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90308",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9032",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90324",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90346",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90354",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90353",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90347",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2805"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40816"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40982"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42314"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42317"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48951"
                },
                {
                    "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?30644",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?30644"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4435"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4456"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4457"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0864.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/42285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/42285"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-972-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-972-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2018"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/2106",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/2106"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3045"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3046"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626",
                    "reference_id": "625626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625626"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805",
                    "reference_id": "CVE-2010-2805",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2805"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-09",
                    "reference_id": "GLSA-201201-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0864",
                    "reference_id": "RHSA-2010:0864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/972-1/",
                    "reference_id": "USN-972-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/972-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922656?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-2805"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=api",
            "vulnerability_id": "VCID-zpnw-kwqf-63bp",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78063",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78028",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77971",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78008",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78016",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78021",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78048",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://savannah.nongnu.org/bugs/?41309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://savannah.nongnu.org/bugs/?41309"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3370"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373",
                    "reference_id": "1262373",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619",
                    "reference_id": "798619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747",
                    "reference_id": "CVE-2014-9747",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922666?format=api",
                    "purl": "pkg:deb/debian/freetype@2.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-9747"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=api",
            "vulnerability_id": "VCID-zu7v-a14h-2ueu",
            "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89672",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89619",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89635",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89652",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89658",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89657",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864",
                    "reference_id": "662864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594",
                    "reference_id": "800594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136",
                    "reference_id": "CVE-2012-1136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201204-04",
                    "reference_id": "GLSA-201204-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201204-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21",
                    "reference_id": "mfsa2012-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467",
                    "reference_id": "RHSA-2012:0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0467"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1403-1/",
                    "reference_id": "USN-1403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1403-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api",
                    "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api",
                    "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hgm7-qrp2-c3g8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api",
                    "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api",
                    "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api",
                    "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-1136"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu"
        }
    ],
    "risk_score": "1.6",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"
}