Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.4.9-1?distro=trixie
Typedeb
Namespacedebian
Namefreetype
Version2.4.9-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.9-1.1
Latest_non_vulnerable_version2.14.3+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1teu-tz69-dff8
vulnerability_id VCID-1teu-tz69-dff8
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
reference_id
reference_type
scores
0
value 0.02697
scoring_system epss
scoring_elements 0.85888
published_at 2026-04-21T12:55:00Z
1
value 0.02697
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-01T12:55:00Z
2
value 0.02697
scoring_system epss
scoring_elements 0.85816
published_at 2026-04-02T12:55:00Z
3
value 0.02697
scoring_system epss
scoring_elements 0.85834
published_at 2026-04-04T12:55:00Z
4
value 0.02697
scoring_system epss
scoring_elements 0.85838
published_at 2026-04-07T12:55:00Z
5
value 0.02697
scoring_system epss
scoring_elements 0.85857
published_at 2026-04-08T12:55:00Z
6
value 0.02697
scoring_system epss
scoring_elements 0.85867
published_at 2026-04-09T12:55:00Z
7
value 0.02697
scoring_system epss
scoring_elements 0.85881
published_at 2026-04-11T12:55:00Z
8
value 0.02697
scoring_system epss
scoring_elements 0.85879
published_at 2026-04-12T12:55:00Z
9
value 0.02697
scoring_system epss
scoring_elements 0.85874
published_at 2026-04-13T12:55:00Z
10
value 0.02697
scoring_system epss
scoring_elements 0.85892
published_at 2026-04-16T12:55:00Z
11
value 0.02697
scoring_system epss
scoring_elements 0.85897
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1128
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800584
reference_id 800584
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
reference_id CVE-2012-1128
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1128
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8
1
url VCID-2fsn-uxp3-fbeg
vulnerability_id VCID-2fsn-uxp3-fbeg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1130
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800587
reference_id 800587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800587
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
reference_id CVE-2012-1130
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1130
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg
2
url VCID-38u1-6t8n-gqey
vulnerability_id VCID-38u1-6t8n-gqey
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
reference_id
reference_type
scores
0
value 0.02148
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-21T12:55:00Z
1
value 0.02148
scoring_system epss
scoring_elements 0.84163
published_at 2026-04-01T12:55:00Z
2
value 0.02148
scoring_system epss
scoring_elements 0.84177
published_at 2026-04-02T12:55:00Z
3
value 0.02148
scoring_system epss
scoring_elements 0.84195
published_at 2026-04-04T12:55:00Z
4
value 0.02148
scoring_system epss
scoring_elements 0.84196
published_at 2026-04-07T12:55:00Z
5
value 0.02148
scoring_system epss
scoring_elements 0.84218
published_at 2026-04-08T12:55:00Z
6
value 0.02148
scoring_system epss
scoring_elements 0.84224
published_at 2026-04-09T12:55:00Z
7
value 0.02148
scoring_system epss
scoring_elements 0.84242
published_at 2026-04-11T12:55:00Z
8
value 0.02148
scoring_system epss
scoring_elements 0.84236
published_at 2026-04-12T12:55:00Z
9
value 0.02148
scoring_system epss
scoring_elements 0.84233
published_at 2026-04-13T12:55:00Z
10
value 0.02148
scoring_system epss
scoring_elements 0.84255
published_at 2026-04-16T12:55:00Z
11
value 0.02148
scoring_system epss
scoring_elements 0.84256
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1143
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800606
reference_id 800606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800606
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
reference_id CVE-2012-1143
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1143
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey
3
url VCID-5rpx-8t3t-syhv
vulnerability_id VCID-5rpx-8t3t-syhv
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1139
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800598
reference_id 800598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800598
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
reference_id CVE-2012-1139
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1139
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv
4
url VCID-613j-8z2t-t3au
vulnerability_id VCID-613j-8z2t-t3au
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1129
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800585
reference_id 800585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800585
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
reference_id CVE-2012-1129
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1129
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au
5
url VCID-6pzj-1sgf-zbbr
vulnerability_id VCID-6pzj-1sgf-zbbr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1144
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800607
reference_id 800607
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800607
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
reference_id CVE-2012-1144
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1144
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr
6
url VCID-6z8y-k8vw-nudd
vulnerability_id VCID-6z8y-k8vw-nudd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1142
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800604
reference_id 800604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800604
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
reference_id CVE-2012-1142
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1142
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd
7
url VCID-d2v4-gm58-uyby
vulnerability_id VCID-d2v4-gm58-uyby
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1140
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800600
reference_id 800600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800600
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
reference_id CVE-2012-1140
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1140
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby
8
url VCID-edag-8pt8-jqdw
vulnerability_id VCID-edag-8pt8-jqdw
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1137
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800595
reference_id 800595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
reference_id CVE-2012-1137
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1137
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw
9
url VCID-ettc-tamy-kfcf
vulnerability_id VCID-ettc-tamy-kfcf
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1133
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800591
reference_id 800591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800591
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
reference_id CVE-2012-1133
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1133
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf
10
url VCID-ewj8-a9c8-w3dy
vulnerability_id VCID-ewj8-a9c8-w3dy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1135
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800593
reference_id 800593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800593
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
reference_id CVE-2012-1135
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1135
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy
11
url VCID-h7qy-dusf-tqb7
vulnerability_id VCID-h7qy-dusf-tqb7
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1141
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800602
reference_id 800602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800602
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
reference_id CVE-2012-1141
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1141
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7
12
url VCID-hgkz-p83z-ybfe
vulnerability_id VCID-hgkz-p83z-ybfe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1127
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800583
reference_id 800583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800583
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
reference_id CVE-2012-1127
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1127
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe
13
url VCID-jwbe-5wmu-uqgp
vulnerability_id VCID-jwbe-5wmu-uqgp
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1131
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800589
reference_id 800589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800589
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
reference_id CVE-2012-1131
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1131
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp
14
url VCID-mv93-73qb-ekgt
vulnerability_id VCID-mv93-73qb-ekgt
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
reference_id
reference_type
scores
0
value 0.02967
scoring_system epss
scoring_elements 0.86512
published_at 2026-04-21T12:55:00Z
1
value 0.02967
scoring_system epss
scoring_elements 0.86433
published_at 2026-04-01T12:55:00Z
2
value 0.02967
scoring_system epss
scoring_elements 0.86444
published_at 2026-04-02T12:55:00Z
3
value 0.02967
scoring_system epss
scoring_elements 0.86463
published_at 2026-04-04T12:55:00Z
4
value 0.02967
scoring_system epss
scoring_elements 0.86462
published_at 2026-04-07T12:55:00Z
5
value 0.02967
scoring_system epss
scoring_elements 0.86481
published_at 2026-04-08T12:55:00Z
6
value 0.02967
scoring_system epss
scoring_elements 0.86491
published_at 2026-04-09T12:55:00Z
7
value 0.02967
scoring_system epss
scoring_elements 0.86507
published_at 2026-04-11T12:55:00Z
8
value 0.02967
scoring_system epss
scoring_elements 0.86504
published_at 2026-04-12T12:55:00Z
9
value 0.02967
scoring_system epss
scoring_elements 0.86498
published_at 2026-04-13T12:55:00Z
10
value 0.02967
scoring_system epss
scoring_elements 0.86514
published_at 2026-04-16T12:55:00Z
11
value 0.02967
scoring_system epss
scoring_elements 0.86519
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1132
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800590
reference_id 800590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
reference_id CVE-2012-1132
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1132
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt
15
url VCID-n99m-fgj7-y3bk
vulnerability_id VCID-n99m-fgj7-y3bk
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
reference_id
reference_type
scores
0
value 0.03525
scoring_system epss
scoring_elements 0.87664
published_at 2026-04-21T12:55:00Z
1
value 0.03525
scoring_system epss
scoring_elements 0.87597
published_at 2026-04-01T12:55:00Z
2
value 0.03525
scoring_system epss
scoring_elements 0.87606
published_at 2026-04-02T12:55:00Z
3
value 0.03525
scoring_system epss
scoring_elements 0.8762
published_at 2026-04-04T12:55:00Z
4
value 0.03525
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-07T12:55:00Z
5
value 0.03525
scoring_system epss
scoring_elements 0.87642
published_at 2026-04-08T12:55:00Z
6
value 0.03525
scoring_system epss
scoring_elements 0.87648
published_at 2026-04-09T12:55:00Z
7
value 0.03525
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-11T12:55:00Z
8
value 0.03525
scoring_system epss
scoring_elements 0.87654
published_at 2026-04-12T12:55:00Z
9
value 0.03525
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-13T12:55:00Z
10
value 0.03525
scoring_system epss
scoring_elements 0.87666
published_at 2026-04-16T12:55:00Z
11
value 0.03525
scoring_system epss
scoring_elements 0.87667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1138
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800597
reference_id 800597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800597
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
reference_id CVE-2012-1138
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1138
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk
16
url VCID-wapu-grak-1bca
vulnerability_id VCID-wapu-grak-1bca
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
reference_id
reference_type
scores
0
value 0.05858
scoring_system epss
scoring_elements 0.90573
published_at 2026-04-21T12:55:00Z
1
value 0.05858
scoring_system epss
scoring_elements 0.90517
published_at 2026-04-01T12:55:00Z
2
value 0.05858
scoring_system epss
scoring_elements 0.90521
published_at 2026-04-02T12:55:00Z
3
value 0.05858
scoring_system epss
scoring_elements 0.90531
published_at 2026-04-04T12:55:00Z
4
value 0.05858
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-07T12:55:00Z
5
value 0.05858
scoring_system epss
scoring_elements 0.90549
published_at 2026-04-08T12:55:00Z
6
value 0.05858
scoring_system epss
scoring_elements 0.90556
published_at 2026-04-09T12:55:00Z
7
value 0.05858
scoring_system epss
scoring_elements 0.90564
published_at 2026-04-12T12:55:00Z
8
value 0.05858
scoring_system epss
scoring_elements 0.90558
published_at 2026-04-13T12:55:00Z
9
value 0.05858
scoring_system epss
scoring_elements 0.90575
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1134
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800592
reference_id 800592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800592
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
reference_id CVE-2012-1134
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1134
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca
17
url VCID-xe45-fv7j-4ucr
vulnerability_id VCID-xe45-fv7j-4ucr
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
reference_id
reference_type
scores
0
value 0.03091
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-21T12:55:00Z
1
value 0.03091
scoring_system epss
scoring_elements 0.86727
published_at 2026-04-01T12:55:00Z
2
value 0.03091
scoring_system epss
scoring_elements 0.86738
published_at 2026-04-02T12:55:00Z
3
value 0.03091
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-04T12:55:00Z
4
value 0.03091
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-07T12:55:00Z
5
value 0.03091
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-08T12:55:00Z
6
value 0.03091
scoring_system epss
scoring_elements 0.86784
published_at 2026-04-09T12:55:00Z
7
value 0.03091
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-11T12:55:00Z
8
value 0.03091
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-12T12:55:00Z
9
value 0.03091
scoring_system epss
scoring_elements 0.8679
published_at 2026-04-13T12:55:00Z
10
value 0.03091
scoring_system epss
scoring_elements 0.86805
published_at 2026-04-16T12:55:00Z
11
value 0.03091
scoring_system epss
scoring_elements 0.8681
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1126
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800581
reference_id 800581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800581
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
reference_id CVE-2012-1126
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1126
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr
18
url VCID-zu7v-a14h-2ueu
vulnerability_id VCID-zu7v-a14h-2ueu
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause Denial of
    Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
reference_id
reference_type
scores
0
value 0.04956
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
1
value 0.04956
scoring_system epss
scoring_elements 0.89619
published_at 2026-04-01T12:55:00Z
2
value 0.04956
scoring_system epss
scoring_elements 0.89622
published_at 2026-04-02T12:55:00Z
3
value 0.04956
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-04T12:55:00Z
4
value 0.04956
scoring_system epss
scoring_elements 0.89636
published_at 2026-04-07T12:55:00Z
5
value 0.04956
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-08T12:55:00Z
6
value 0.04956
scoring_system epss
scoring_elements 0.89658
published_at 2026-04-09T12:55:00Z
7
value 0.04956
scoring_system epss
scoring_elements 0.89665
published_at 2026-04-11T12:55:00Z
8
value 0.04956
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
9
value 0.04956
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-13T12:55:00Z
10
value 0.04956
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1136
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
reference_id 662864
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=800594
reference_id 800594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=800594
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
reference_id CVE-2012-1136
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136
5
reference_url https://security.gentoo.org/glsa/201204-04
reference_id GLSA-201204-04
reference_type
scores
url https://security.gentoo.org/glsa/201204-04
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
reference_id mfsa2012-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-21
7
reference_url https://access.redhat.com/errata/RHSA-2012:0467
reference_id RHSA-2012:0467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0467
8
reference_url https://usn.ubuntu.com/1403-1/
reference_id USN-1403-1
reference_type
scores
url https://usn.ubuntu.com/1403-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1?distro=trixie
purl pkg:deb/debian/freetype@2.4.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie
5
url pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-1136
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie