Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/922662?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "freetype", "version": "2.4.9-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.4.9-1.1", "latest_non_vulnerable_version": "2.14.3+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=api", "vulnerability_id": "VCID-1teu-tz69-dff8", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.8591", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85838", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85879", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85874", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85892", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85897", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02697", "scoring_system": "epss", "scoring_elements": "0.85888", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1128" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584", "reference_id": "800584", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128", "reference_id": "CVE-2012-1128", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1128" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=api", "vulnerability_id": "VCID-2fsn-uxp3-fbeg", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1130" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587", "reference_id": "800587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130", "reference_id": "CVE-2012-1130", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1130" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=api", "vulnerability_id": "VCID-38u1-6t8n-gqey", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84286", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84196", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84242", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84233", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84256", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02148", "scoring_system": "epss", "scoring_elements": "0.84261", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1143" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606", "reference_id": "800606", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143", "reference_id": "CVE-2012-1143", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1143" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=api", "vulnerability_id": "VCID-5rpx-8t3t-syhv", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1139" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598", "reference_id": "800598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139", "reference_id": "CVE-2012-1139", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1139" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=api", "vulnerability_id": "VCID-613j-8z2t-t3au", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1129" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585", "reference_id": "800585", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129", "reference_id": "CVE-2012-1129", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1129" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=api", "vulnerability_id": "VCID-6pzj-1sgf-zbbr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1144" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607", "reference_id": "800607", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144", "reference_id": "CVE-2012-1144", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1144" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=api", "vulnerability_id": "VCID-6z8y-k8vw-nudd", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1142" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604", "reference_id": "800604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142", "reference_id": "CVE-2012-1142", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1142" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=api", "vulnerability_id": "VCID-d2v4-gm58-uyby", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1140" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600", "reference_id": "800600", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140", "reference_id": "CVE-2012-1140", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1140" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=api", "vulnerability_id": "VCID-edag-8pt8-jqdw", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1137" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595", "reference_id": "800595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137", "reference_id": "CVE-2012-1137", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1137" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=api", "vulnerability_id": "VCID-ettc-tamy-kfcf", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1133" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591", "reference_id": "800591", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133", "reference_id": "CVE-2012-1133", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1133" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=api", "vulnerability_id": "VCID-ewj8-a9c8-w3dy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1135" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593", "reference_id": "800593", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135", "reference_id": "CVE-2012-1135", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1135" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=api", "vulnerability_id": "VCID-h7qy-dusf-tqb7", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1141" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602", "reference_id": "800602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141", "reference_id": "CVE-2012-1141", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1141" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=api", "vulnerability_id": "VCID-hgkz-p83z-ybfe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1127" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583", "reference_id": "800583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127", "reference_id": "CVE-2012-1127", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1127" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=api", "vulnerability_id": "VCID-jwbe-5wmu-uqgp", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1131" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589", "reference_id": "800589", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131", "reference_id": "CVE-2012-1131", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1131" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=api", "vulnerability_id": "VCID-mv93-73qb-ekgt", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86433", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86514", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86519", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02967", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1132" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590", "reference_id": "800590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132", "reference_id": "CVE-2012-1132", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1132" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=api", "vulnerability_id": "VCID-n99m-fgj7-y3bk", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87597", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87606", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.8762", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87654", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03525", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1138" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597", "reference_id": "800597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138", "reference_id": "CVE-2012-1138", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1138" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=api", "vulnerability_id": "VCID-wapu-grak-1bca", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90588", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90521", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90538", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05858", "scoring_system": "epss", "scoring_elements": "0.90573", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1134" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592", "reference_id": "800592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800592" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134", "reference_id": "CVE-2012-1134", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1134" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=api", "vulnerability_id": "VCID-xe45-fv7j-4ucr", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86824", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86727", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86784", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86805", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.8681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03091", "scoring_system": "epss", "scoring_elements": "0.86808", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1126" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581", "reference_id": "800581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126", "reference_id": "CVE-2012-1126", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1126" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=api", "vulnerability_id": "VCID-zu7v-a14h-2ueu", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause Denial of\n Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89619", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89635", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89657", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04956", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1136" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864", "reference_id": "662864", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594", "reference_id": "800594", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136", "reference_id": "CVE-2012-1136", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" }, { "reference_url": "https://security.gentoo.org/glsa/201204-04", "reference_id": "GLSA-201204-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201204-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21", "reference_id": "mfsa2012-21", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0467", "reference_id": "RHSA-2012:0467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0467" }, { "reference_url": "https://usn.ubuntu.com/1403-1/", "reference_id": "USN-1403-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1403-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922662?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922647?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922645?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922649?format=api", "purl": "pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922648?format=api", "purl": "pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000437?format=api", "purl": "pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-1136" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1%3Fdistro=trixie" }