Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.4.2-1?distro=trixie
Typedeb
Namespacedebian
Namefreetype
Version2.4.2-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.2-2.1
Latest_non_vulnerable_version2.14.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-48rk-qwp7-j7a8
vulnerability_id VCID-48rk-qwp7-j7a8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
reference_id
reference_type
scores
0
value 0.05194
scoring_system epss
scoring_elements 0.89934
published_at 2026-04-21T12:55:00Z
1
value 0.05194
scoring_system epss
scoring_elements 0.89882
published_at 2026-04-01T12:55:00Z
2
value 0.05194
scoring_system epss
scoring_elements 0.89885
published_at 2026-04-02T12:55:00Z
3
value 0.05194
scoring_system epss
scoring_elements 0.89898
published_at 2026-04-04T12:55:00Z
4
value 0.05194
scoring_system epss
scoring_elements 0.89903
published_at 2026-04-07T12:55:00Z
5
value 0.05194
scoring_system epss
scoring_elements 0.89919
published_at 2026-04-08T12:55:00Z
6
value 0.05194
scoring_system epss
scoring_elements 0.89924
published_at 2026-04-09T12:55:00Z
7
value 0.05194
scoring_system epss
scoring_elements 0.89932
published_at 2026-04-11T12:55:00Z
8
value 0.05194
scoring_system epss
scoring_elements 0.8993
published_at 2026-04-12T12:55:00Z
9
value 0.05194
scoring_system epss
scoring_elements 0.89923
published_at 2026-04-13T12:55:00Z
10
value 0.05194
scoring_system epss
scoring_elements 0.89937
published_at 2026-04-16T12:55:00Z
11
value 0.05194
scoring_system epss
scoring_elements 0.89939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2807
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://savannah.nongnu.org/bugs/?30657
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30657
15
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
16
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
17
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
18
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
19
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
20
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
21
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
22
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
23
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625627
reference_id 625627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625627
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
reference_id CVE-2010-2807
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2807
35
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
36
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2807
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8
1
url VCID-4wp3-qsuc-1kh9
vulnerability_id VCID-4wp3-qsuc-1kh9
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
reference_id
reference_type
scores
0
value 0.09383
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-21T12:55:00Z
1
value 0.09383
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-01T12:55:00Z
2
value 0.09383
scoring_system epss
scoring_elements 0.9276
published_at 2026-04-02T12:55:00Z
3
value 0.09383
scoring_system epss
scoring_elements 0.92765
published_at 2026-04-04T12:55:00Z
4
value 0.09383
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-07T12:55:00Z
5
value 0.09383
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-08T12:55:00Z
6
value 0.09383
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-09T12:55:00Z
7
value 0.09383
scoring_system epss
scoring_elements 0.92782
published_at 2026-04-11T12:55:00Z
8
value 0.09383
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-12T12:55:00Z
9
value 0.09383
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-13T12:55:00Z
10
value 0.09383
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30656
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30656
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621980
reference_id 621980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621980
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
reference_id CVE-2010-2806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
40
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
41
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
42
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2806
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9
2
url VCID-cwfg-1d6f-hfgg
vulnerability_id VCID-cwfg-1d6f-hfgg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128110167119337&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128110167119337&w=2
5
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
reference_id
reference_type
scores
0
value 0.07802
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-21T12:55:00Z
1
value 0.07802
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-01T12:55:00Z
2
value 0.07802
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-02T12:55:00Z
3
value 0.07802
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-04T12:55:00Z
4
value 0.07802
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-07T12:55:00Z
5
value 0.07802
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-08T12:55:00Z
6
value 0.07802
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-09T12:55:00Z
7
value 0.07802
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-11T12:55:00Z
8
value 0.07802
scoring_system epss
scoring_elements 0.91979
published_at 2026-04-12T12:55:00Z
9
value 0.07802
scoring_system epss
scoring_elements 0.91976
published_at 2026-04-13T12:55:00Z
10
value 0.07802
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-16T12:55:00Z
11
value 0.07802
scoring_system epss
scoring_elements 0.91993
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
10
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
11
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
12
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
13
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30658
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30658
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621907
reference_id 621907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621907
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
reference_id CVE-2010-2808
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
40
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
41
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2808
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg
3
url VCID-gcht-dzky-fbay
vulnerability_id VCID-gcht-dzky-fbay
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
reference_id
reference_type
scores
0
value 0.03893
scoring_system epss
scoring_elements 0.88275
published_at 2026-04-21T12:55:00Z
1
value 0.03893
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-01T12:55:00Z
2
value 0.03893
scoring_system epss
scoring_elements 0.88214
published_at 2026-04-02T12:55:00Z
3
value 0.03893
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-04T12:55:00Z
4
value 0.03893
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-07T12:55:00Z
5
value 0.03893
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-08T12:55:00Z
6
value 0.03893
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-09T12:55:00Z
7
value 0.03893
scoring_system epss
scoring_elements 0.88272
published_at 2026-04-11T12:55:00Z
8
value 0.03893
scoring_system epss
scoring_elements 0.88264
published_at 2026-04-12T12:55:00Z
9
value 0.03893
scoring_system epss
scoring_elements 0.88263
published_at 2026-04-13T12:55:00Z
10
value 0.03893
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-16T12:55:00Z
11
value 0.03893
scoring_system epss
scoring_elements 0.88276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
11
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
14
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
15
reference_url http://www.securityfocus.com/bid/42621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42621
16
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625632
reference_id 625632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625632
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
reference_id CVE-2010-3054
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
28
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3054
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay
4
url VCID-gmk4-9sks-s3a5
vulnerability_id VCID-gmk4-9sks-s3a5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
reference_id
reference_type
scores
0
value 0.04292
scoring_system epss
scoring_elements 0.88809
published_at 2026-04-01T12:55:00Z
1
value 0.04292
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-04T12:55:00Z
2
value 0.04292
scoring_system epss
scoring_elements 0.88837
published_at 2026-04-07T12:55:00Z
3
value 0.04292
scoring_system epss
scoring_elements 0.88854
published_at 2026-04-08T12:55:00Z
4
value 0.04292
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-09T12:55:00Z
5
value 0.04292
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-11T12:55:00Z
6
value 0.04292
scoring_system epss
scoring_elements 0.88818
published_at 2026-04-02T12:55:00Z
7
value 0.04622
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-18T12:55:00Z
8
value 0.04622
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-21T12:55:00Z
9
value 0.04622
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-12T12:55:00Z
10
value 0.04622
scoring_system epss
scoring_elements 0.89269
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
3
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
5
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
6
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
7
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
8
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
11
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
12
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617342
reference_id 617342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617342
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
reference_id CVE-2010-2541
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
21
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
22
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
23
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
24
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2541
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5
5
url VCID-vykx-mb8e-hyfv
vulnerability_id VCID-vykx-mb8e-hyfv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50
2
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc
3
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html
4
reference_url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html
5
reference_url http://osvdb.org/66828
reference_id
reference_type
scores
url http://osvdb.org/66828
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
reference_id
reference_type
scores
0
value 0.5972
scoring_system epss
scoring_elements 0.98264
published_at 2026-04-18T12:55:00Z
1
value 0.5972
scoring_system epss
scoring_elements 0.98242
published_at 2026-04-01T12:55:00Z
2
value 0.5972
scoring_system epss
scoring_elements 0.98245
published_at 2026-04-02T12:55:00Z
3
value 0.5972
scoring_system epss
scoring_elements 0.98248
published_at 2026-04-07T12:55:00Z
4
value 0.5972
scoring_system epss
scoring_elements 0.98253
published_at 2026-04-08T12:55:00Z
5
value 0.5972
scoring_system epss
scoring_elements 0.98254
published_at 2026-04-09T12:55:00Z
6
value 0.5972
scoring_system epss
scoring_elements 0.98257
published_at 2026-04-13T12:55:00Z
7
value 0.5972
scoring_system epss
scoring_elements 0.98263
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1797
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797
10
reference_url http://secunia.com/advisories/40807
reference_id
reference_type
scores
url http://secunia.com/advisories/40807
11
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
12
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/60856
15
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
16
reference_url http://support.apple.com/kb/HT4291
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4291
17
reference_url http://support.apple.com/kb/HT4292
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4292
18
reference_url http://www.exploit-db.com/exploits/14538
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/14538
19
reference_url http://www.f-secure.com/weblog/archives/00002002.html
reference_id
reference_type
scores
url http://www.f-secure.com/weblog/archives/00002002.html
20
reference_url http://www.securityfocus.com/bid/42151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42151
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621144
reference_id 621144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621144
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
reference_id CVE-2010-1797
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1797
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
reference_id CVE-2010-1797;OSVDB-66828
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py
92
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
reference_id CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt
93
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
94
reference_url https://access.redhat.com/errata/RHSA-2010:0607
reference_id RHSA-2010:0607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0607
95
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-1797
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv
6
url VCID-yq1k-j2t6-e7g5
vulnerability_id VCID-yq1k-j2t6-e7g5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
reference_id
reference_type
scores
0
value 0.01701
scoring_system epss
scoring_elements 0.82332
published_at 2026-04-21T12:55:00Z
1
value 0.01701
scoring_system epss
scoring_elements 0.82226
published_at 2026-04-01T12:55:00Z
2
value 0.01701
scoring_system epss
scoring_elements 0.82239
published_at 2026-04-02T12:55:00Z
3
value 0.01701
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-04T12:55:00Z
4
value 0.01701
scoring_system epss
scoring_elements 0.82254
published_at 2026-04-07T12:55:00Z
5
value 0.01701
scoring_system epss
scoring_elements 0.8228
published_at 2026-04-08T12:55:00Z
6
value 0.01701
scoring_system epss
scoring_elements 0.82288
published_at 2026-04-09T12:55:00Z
7
value 0.01701
scoring_system epss
scoring_elements 0.82308
published_at 2026-04-11T12:55:00Z
8
value 0.01701
scoring_system epss
scoring_elements 0.82301
published_at 2026-04-12T12:55:00Z
9
value 0.01701
scoring_system epss
scoring_elements 0.82295
published_at 2026-04-13T12:55:00Z
10
value 0.01701
scoring_system epss
scoring_elements 0.8233
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3053
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
12
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
13
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
14
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625630
reference_id 625630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625630
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
reference_id CVE-2010-3053
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3053
47
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3053
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5
7
url VCID-zn5p-qvxr-fqhx
vulnerability_id VCID-zn5p-qvxr-fqhx
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
reference_id
reference_type
scores
0
value 0.05634
scoring_system epss
scoring_elements 0.90361
published_at 2026-04-21T12:55:00Z
1
value 0.05634
scoring_system epss
scoring_elements 0.90305
published_at 2026-04-01T12:55:00Z
2
value 0.05634
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-02T12:55:00Z
3
value 0.05634
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-04T12:55:00Z
4
value 0.05634
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-07T12:55:00Z
5
value 0.05634
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-08T12:55:00Z
6
value 0.05634
scoring_system epss
scoring_elements 0.90346
published_at 2026-04-09T12:55:00Z
7
value 0.05634
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-11T12:55:00Z
8
value 0.05634
scoring_system epss
scoring_elements 0.90353
published_at 2026-04-12T12:55:00Z
9
value 0.05634
scoring_system epss
scoring_elements 0.90347
published_at 2026-04-13T12:55:00Z
10
value 0.05634
scoring_system epss
scoring_elements 0.90363
published_at 2026-04-16T12:55:00Z
11
value 0.05634
scoring_system epss
scoring_elements 0.90362
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2805
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://savannah.nongnu.org/bugs/?30644
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30644
16
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
17
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
18
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
20
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
21
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
22
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
23
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
24
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
25
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625626
reference_id 625626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625626
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
reference_id CVE-2010-2805
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2805
37
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
38
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
39
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.2-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2805
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie