Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.4.0-1?distro=trixie
Typedeb
Namespacedebian
Namefreetype
Version2.4.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.2-1
Latest_non_vulnerable_version2.14.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3xz8-4wu5-fugq
vulnerability_id VCID-3xz8-4wu5-fugq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30263
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30263
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613167
reference_id 613167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613167
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
reference_id CVE-2010-2500
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2500
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq
1
url VCID-57th-r73p-a3fy
vulnerability_id VCID-57th-r73p-a3fy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
1
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
2
reference_url http://marc.info/?l=oss-security&m=127912955808467&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127912955808467&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
reference_id
reference_type
scores
0
value 0.02329
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-21T12:55:00Z
1
value 0.02329
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-01T12:55:00Z
2
value 0.02329
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-02T12:55:00Z
3
value 0.02329
scoring_system epss
scoring_elements 0.84786
published_at 2026-04-04T12:55:00Z
4
value 0.02329
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-07T12:55:00Z
5
value 0.02329
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-08T12:55:00Z
6
value 0.02329
scoring_system epss
scoring_elements 0.84817
published_at 2026-04-09T12:55:00Z
7
value 0.02329
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-11T12:55:00Z
8
value 0.02329
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-12T12:55:00Z
9
value 0.02329
scoring_system epss
scoring_elements 0.84827
published_at 2026-04-13T12:55:00Z
10
value 0.02329
scoring_system epss
scoring_elements 0.84848
published_at 2026-04-16T12:55:00Z
11
value 0.02329
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
5
reference_url http://savannah.nongnu.org/bugs/?30054
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/?30054
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
7
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
8
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
9
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
12
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=614557
reference_id 614557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=614557
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
reference_id CVE-2010-2527
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
22
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
23
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
24
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2527
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy
2
url VCID-7698-fwj1-fufd
vulnerability_id VCID-7698-fwj1-fufd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
reference_id
reference_type
scores
0
value 0.03648
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-21T12:55:00Z
1
value 0.03648
scoring_system epss
scoring_elements 0.8788
published_at 2026-04-16T12:55:00Z
2
value 0.03648
scoring_system epss
scoring_elements 0.87879
published_at 2026-04-18T12:55:00Z
3
value 0.03648
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-02T12:55:00Z
4
value 0.03648
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-04T12:55:00Z
5
value 0.03648
scoring_system epss
scoring_elements 0.87835
published_at 2026-04-07T12:55:00Z
6
value 0.03648
scoring_system epss
scoring_elements 0.87856
published_at 2026-04-08T12:55:00Z
7
value 0.03648
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-09T12:55:00Z
8
value 0.03648
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-11T12:55:00Z
9
value 0.03648
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-12T12:55:00Z
10
value 0.03648
scoring_system epss
scoring_elements 0.87866
published_at 2026-04-13T12:55:00Z
11
value 0.04785
scoring_system epss
scoring_elements 0.89433
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
4
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
5
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
6
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
7
reference_url http://www.debian.org/security/2010/dsa-2116
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2116
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
10
reference_url http://www.securityfocus.com/bid/43700
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43700
11
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=623625
reference_id 623625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=623625
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
reference_id CVE-2010-3311
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
43
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
44
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
45
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
46
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
47
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-3311
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd
3
url VCID-ahxa-yjxp-a7en
vulnerability_id VCID-ahxa-yjxp-a7en
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
reference_id
reference_type
scores
0
value 0.03379
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-21T12:55:00Z
1
value 0.03379
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-01T12:55:00Z
2
value 0.03379
scoring_system epss
scoring_elements 0.8734
published_at 2026-04-02T12:55:00Z
3
value 0.03379
scoring_system epss
scoring_elements 0.87355
published_at 2026-04-04T12:55:00Z
4
value 0.03379
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-07T12:55:00Z
5
value 0.03379
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-08T12:55:00Z
6
value 0.03379
scoring_system epss
scoring_elements 0.87381
published_at 2026-04-09T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-11T12:55:00Z
8
value 0.03379
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-12T12:55:00Z
9
value 0.03379
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-13T12:55:00Z
10
value 0.03379
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-16T12:55:00Z
11
value 0.03379
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30248
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30248
12
reference_url https://savannah.nongnu.org/bugs/?30249
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30249
13
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
14
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
17
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613162
reference_id 613162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613162
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
reference_id CVE-2010-2499
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
28
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2499
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en
4
url VCID-bt31-xk8r-8qd2
vulnerability_id VCID-bt31-xk8r-8qd2
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
reference_id
reference_type
scores
0
value 0.02089
scoring_system epss
scoring_elements 0.84048
published_at 2026-04-21T12:55:00Z
1
value 0.02089
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-01T12:55:00Z
2
value 0.02089
scoring_system epss
scoring_elements 0.83968
published_at 2026-04-02T12:55:00Z
3
value 0.02089
scoring_system epss
scoring_elements 0.83983
published_at 2026-04-04T12:55:00Z
4
value 0.02089
scoring_system epss
scoring_elements 0.83987
published_at 2026-04-07T12:55:00Z
5
value 0.02089
scoring_system epss
scoring_elements 0.84011
published_at 2026-04-08T12:55:00Z
6
value 0.02089
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-09T12:55:00Z
7
value 0.02089
scoring_system epss
scoring_elements 0.84033
published_at 2026-04-11T12:55:00Z
8
value 0.02089
scoring_system epss
scoring_elements 0.84026
published_at 2026-04-12T12:55:00Z
9
value 0.02089
scoring_system epss
scoring_elements 0.84022
published_at 2026-04-13T12:55:00Z
10
value 0.02089
scoring_system epss
scoring_elements 0.84046
published_at 2026-04-16T12:55:00Z
11
value 0.02089
scoring_system epss
scoring_elements 0.84047
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2497
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30082
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30082
10
reference_url https://savannah.nongnu.org/bugs/?30083
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30083
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613154
reference_id 613154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613154
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
reference_id CVE-2010-2497
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2497
19
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2497
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2
5
url VCID-pzsb-3h3d-t7hq
vulnerability_id VCID-pzsb-3h3d-t7hq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30106
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30106
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
15
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613160
reference_id 613160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613160
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
reference_id CVE-2010-2498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
28
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2498
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq
6
url VCID-tyhk-9jvd-y7bj
vulnerability_id VCID-tyhk-9jvd-y7bj
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
reference_id
reference_type
scores
0
value 0.03154
scoring_system epss
scoring_elements 0.86924
published_at 2026-04-21T12:55:00Z
1
value 0.03154
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-01T12:55:00Z
2
value 0.03154
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-02T12:55:00Z
3
value 0.03154
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-04T12:55:00Z
4
value 0.03154
scoring_system epss
scoring_elements 0.86871
published_at 2026-04-07T12:55:00Z
5
value 0.03154
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-08T12:55:00Z
6
value 0.03154
scoring_system epss
scoring_elements 0.86899
published_at 2026-04-09T12:55:00Z
7
value 0.03154
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-11T12:55:00Z
8
value 0.03154
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-12T12:55:00Z
9
value 0.03154
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-13T12:55:00Z
10
value 0.03154
scoring_system epss
scoring_elements 0.86918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2520
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url https://savannah.nongnu.org/bugs/?30361
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30361
10
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
11
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
13
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613198
reference_id 613198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613198
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
reference_id CVE-2010-2520
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2520
24
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2520
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj
7
url VCID-wbve-vpw4-tqhe
vulnerability_id VCID-wbve-vpw4-tqhe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
reference_id
reference_type
scores
0
value 0.0452
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-21T12:55:00Z
1
value 0.0452
scoring_system epss
scoring_elements 0.89105
published_at 2026-04-01T12:55:00Z
2
value 0.0452
scoring_system epss
scoring_elements 0.89114
published_at 2026-04-02T12:55:00Z
3
value 0.0452
scoring_system epss
scoring_elements 0.89128
published_at 2026-04-04T12:55:00Z
4
value 0.0452
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-07T12:55:00Z
5
value 0.0452
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-08T12:55:00Z
6
value 0.0452
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-09T12:55:00Z
7
value 0.0452
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-11T12:55:00Z
8
value 0.0452
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-12T12:55:00Z
9
value 0.0452
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-13T12:55:00Z
10
value 0.0452
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30306
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30306
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613194
reference_id 613194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613194
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
reference_id CVE-2010-2519
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
29
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.0-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2010-2519
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.0-1%3Fdistro=trixie