{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","type":"deb","namespace":"debian","name":"freetype","version":"2.5.2-3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.12.1+dfsg-5+deb12u4","latest_non_vulnerable_version":"2.12.1+dfsg-5+deb12u4","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=json","vulnerability_id":"VCID-6xf8-49hw-hfaf","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10244","reference_id":"","reference_type":"","scores":[{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.6658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66612","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429965","reference_id":"1429965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429965"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971","reference_id":"856971","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3237-1/","reference_id":"USN-3237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2016-10244"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=json","vulnerability_id":"VCID-a9r6-k8gp-nbfs","summary":"freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9383","reference_id":"","reference_type":"","scores":[{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.86003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.8598","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?46346","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?46346"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763613","reference_id":"1763613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763613"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9383","reference_id":"CVE-2015-9383","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9383"},{"reference_url":"https://usn.ubuntu.com/4126-1/","reference_id":"USN-4126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-1/"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9383"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=json","vulnerability_id":"VCID-b35u-t7u2-sudy","summary":"security update","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9746","reference_id":"","reference_type":"","scores":[{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.7472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://savannah.nongnu.org/bugs/?41309","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?41309"},{"reference_url":"http://www.debian.org/security/2015/dsa-3370","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3370"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/11/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/11/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/25/4"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373","reference_id":"1262373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619","reference_id":"798619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9746","reference_id":"CVE-2014-9746","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9746"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9746"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=json","vulnerability_id":"VCID-dcxj-zzfj-3bg7","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27406","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35467","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077985","reference_id":"2077985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077985"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5453-1/","reference_id":"USN-5453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5453-1/"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"},{"reference_url":"https://usn.ubuntu.com/7352-2/","reference_id":"USN-7352-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27406"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=json","vulnerability_id":"VCID-hutw-rk7x-5bc3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9745","reference_id":"","reference_type":"","scores":[{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.8637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.864","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86406","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86373","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262377","reference_id":"1262377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262377"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620","reference_id":"798620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620"},{"reference_url":"https://usn.ubuntu.com/2739-1/","reference_id":"USN-2739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2739-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9745"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=json","vulnerability_id":"VCID-m8ha-zxb7-tyg6","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8105","reference_id":"","reference_type":"","scores":[{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81873","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81834","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81858","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.8176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81811","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8105"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3839","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3839"},{"reference_url":"http://www.securityfocus.com/bid/99093","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99093"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446500","reference_id":"1446500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446500"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220","reference_id":"861220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220"},{"reference_url":"https://security.archlinux.org/ASA-201705-10","reference_id":"ASA-201705-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-10"},{"reference_url":"https://security.archlinux.org/ASA-201705-7","reference_id":"ASA-201705-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-7"},{"reference_url":"https://security.archlinux.org/AVG-257","reference_id":"AVG-257","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-257"},{"reference_url":"https://security.archlinux.org/AVG-258","reference_id":"AVG-258","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-258"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8105","reference_id":"CVE-2017-8105","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8105"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3282-1/","reference_id":"USN-3282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-1/"},{"reference_url":"https://usn.ubuntu.com/3282-2/","reference_id":"USN-3282-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2017-8105"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=json","vulnerability_id":"VCID-nn4w-gq71-kfgd","summary":"freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9290","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65999","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66029","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1741802","reference_id":"1741802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1741802"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9290"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=json","vulnerability_id":"VCID-nx21-ks3v-53e4","summary":"Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15999","reference_id":"","reference_type":"","scores":[{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99774","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15999"},{"reference_url":"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html"},{"reference_url":"https://crbug.com/1139963","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://crbug.com/1139963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576"},{"reference_url":"http://seclists.org/fulldisclosure/2020/Nov/33","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"http://seclists.org/fulldisclosure/2020/Nov/33"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/cefsharp/CefSharp","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/cefsharp/CefSharp"},{"reference_url":"https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62"},{"reference_url":"https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15999","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15999"},{"reference_url":"https://security.gentoo.org/glsa/202011-12","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202011-12"},{"reference_url":"https://security.gentoo.org/glsa/202012-04","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202012-04"},{"reference_url":"https://security.gentoo.org/glsa/202401-19","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202401-19"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240812-0001","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240812-0001"},{"reference_url":"https://www.debian.org/security/2021/dsa-4824","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://www.debian.org/security/2021/dsa-4824"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Common","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Common"},{"reference_url":"https://www.nuget.org/packages/CefSharp.WinForms","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.WinForms"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Wpf","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Wpf"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Wpf.HwndHost","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Wpf.HwndHost"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890210","reference_id":"1890210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890210"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586","reference_id":"972586","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586"},{"reference_url":"https://security.archlinux.org/ASA-202010-10","reference_id":"ASA-202010-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202010-10"},{"reference_url":"https://security.archlinux.org/ASA-202010-11","reference_id":"ASA-202010-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202010-11"},{"reference_url":"https://security.archlinux.org/ASA-202011-12","reference_id":"ASA-202011-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-12"},{"reference_url":"https://security.archlinux.org/AVG-1254","reference_id":"AVG-1254","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1254"},{"reference_url":"https://security.archlinux.org/AVG-1255","reference_id":"AVG-1255","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1255"},{"reference_url":"https://security.archlinux.org/AVG-1279","reference_id":"AVG-1279","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1279"},{"reference_url":"https://github.com/advisories/GHSA-pv36-h7jh-qm62","reference_id":"GHSA-pv36-h7jh-qm62","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-pv36-h7jh-qm62"},{"reference_url":"https://security.gentoo.org/glsa/202010-07","reference_id":"GLSA-202010-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202010-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/","reference_id":"J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-50","reference_id":"mfsa2020-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-51","reference_id":"mfsa2020-51","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-51"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-52","reference_id":"mfsa2020-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4351","reference_id":"RHSA-2020:4351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4907","reference_id":"RHSA-2020:4907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4949","reference_id":"RHSA-2020:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4950","reference_id":"RHSA-2020:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4951","reference_id":"RHSA-2020:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4952","reference_id":"RHSA-2020:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4952"},{"reference_url":"https://usn.ubuntu.com/4593-1/","reference_id":"USN-4593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4593-1/"},{"reference_url":"https://usn.ubuntu.com/4593-2/","reference_id":"USN-4593-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4593-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049018?format=json","purl":"pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2020-15999","GHSA-pv36-h7jh-qm62"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=json","vulnerability_id":"VCID-s148-7tzs-gfg8","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27405","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25743","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25631","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077991","reference_id":"2077991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077991"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27405"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=json","vulnerability_id":"VCID-tsw4-kqbc-kqf1","summary":"freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72294","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45955","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45955"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788","reference_id":"1752788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381","reference_id":"CVE-2015-9381","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9381"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=json","vulnerability_id":"VCID-uy24-k7je-pyhr","summary":"A vulnerability has been discovered in FreeType, which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27363","reference_id":"","reference_type":"","scores":[{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98415","published_at":"2026-04-18T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98462","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.68721","scoring_system":"epss","scoring_elements":"0.98627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.69158","scoring_system":"epss","scoring_elements":"0.9865","published_at":"2026-04-24T12:55:00Z"},{"value":"0.69158","scoring_system":"epss","scoring_elements":"0.98651","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351357","reference_id":"2351357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351357"},{"reference_url":"https://security.archlinux.org/ASA-202505-11","reference_id":"ASA-202505-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-11"},{"reference_url":"https://security.archlinux.org/AVG-2877","reference_id":"AVG-2877","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2877"},{"reference_url":"https://www.facebook.com/security/advisories/cve-2025-27363","reference_id":"cve-2025-27363","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/"}],"url":"https://www.facebook.com/security/advisories/cve-2025-27363"},{"reference_url":"https://security.gentoo.org/glsa/202505-07","reference_id":"GLSA-202505-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3382","reference_id":"RHSA-2025:3382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3383","reference_id":"RHSA-2025:3383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3384","reference_id":"RHSA-2025:3384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3385","reference_id":"RHSA-2025:3385","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3385"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3386","reference_id":"RHSA-2025:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3387","reference_id":"RHSA-2025:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3393","reference_id":"RHSA-2025:3393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3395","reference_id":"RHSA-2025:3395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3407","reference_id":"RHSA-2025:3407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3421","reference_id":"RHSA-2025:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8195","reference_id":"RHSA-2025:8195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8219","reference_id":"RHSA-2025:8219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8253","reference_id":"RHSA-2025:8253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8292","reference_id":"RHSA-2025:8292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9380","reference_id":"RHSA-2025:9380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9380"},{"reference_url":"https://usn.ubuntu.com/7352-1/","reference_id":"USN-7352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-1/"},{"reference_url":"https://usn.ubuntu.com/7352-2/","reference_id":"USN-7352-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1056064?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4"}],"aliases":["CVE-2025-27363"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=json","vulnerability_id":"VCID-wr9p-x4sm-aqdh","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8287","reference_id":"","reference_type":"","scores":[{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74002","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8287"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3839","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3839"},{"reference_url":"http://www.securityfocus.com/bid/99091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99091"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446073","reference_id":"1446073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446073"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308","reference_id":"861308","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308"},{"reference_url":"https://security.archlinux.org/ASA-201705-10","reference_id":"ASA-201705-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-10"},{"reference_url":"https://security.archlinux.org/ASA-201705-7","reference_id":"ASA-201705-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-7"},{"reference_url":"https://security.archlinux.org/AVG-257","reference_id":"AVG-257","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-257"},{"reference_url":"https://security.archlinux.org/AVG-258","reference_id":"AVG-258","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-258"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8287","reference_id":"CVE-2017-8287","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8287"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3282-1/","reference_id":"USN-3282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-1/"},{"reference_url":"https://usn.ubuntu.com/3282-2/","reference_id":"USN-3282-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2017-8287"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=json","vulnerability_id":"VCID-xb9q-dk8j-fbch","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27404","reference_id":"","reference_type":"","scores":[{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31138","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077989","reference_id":"2077989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077989"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27404"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=json","vulnerability_id":"VCID-y4qf-qfbv-mqdg","summary":"freetype: NULL pointer dereference in the Ins_GETVARIATION() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6942","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41458","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41643","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49167","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544771","reference_id":"1544771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450","reference_id":"890450","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450"},{"reference_url":"https://security.archlinux.org/ASA-201805-3","reference_id":"ASA-201805-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-3"},{"reference_url":"https://security.archlinux.org/AVG-613","reference_id":"AVG-613","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-613"},{"reference_url":"https://usn.ubuntu.com/3572-1/","reference_id":"USN-3572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3572-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049018?format=json","purl":"pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3"}],"aliases":["CVE-2018-6942"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=json","vulnerability_id":"VCID-ysfs-xxjz-vbep","summary":"freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382","reference_id":"","reference_type":"","scores":[{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45922","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45922"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609","reference_id":"1763609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382","reference_id":"CVE-2015-9382","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9382"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=json","vulnerability_id":"VCID-zpnw-kwqf-63bp","summary":"security update","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9747","reference_id":"","reference_type":"","scores":[{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78016","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78055","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://savannah.nongnu.org/bugs/?41309","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?41309"},{"reference_url":"http://www.debian.org/security/2015/dsa-3370","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3370"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/11/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/11/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/25/4"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373","reference_id":"1262373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619","reference_id":"798619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9747","reference_id":"CVE-2014-9747","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9747"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9747"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38514?format=json","vulnerability_id":"VCID-17au-pc1k-m7at","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9662","reference_id":"","reference_type":"","scores":[{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90103","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90106","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90173","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191084","reference_id":"1191084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9662"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=json","vulnerability_id":"VCID-1ws8-ww77-ybah","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9674","reference_id":"","reference_type":"","scores":[{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89864","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191190","reference_id":"1191190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9674"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=json","vulnerability_id":"VCID-3jn7-t1f6-uyfr","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9657","reference_id":"","reference_type":"","scores":[{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191079","reference_id":"1191079","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9657"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37481?format=json","vulnerability_id":"VCID-468g-dxsr-8yer","summary":"A vulnerability in FreeType could result in execution of arbitrary\n    code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2240","reference_id":"","reference_type":"","scores":[{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.8304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83142","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83156","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646","reference_id":"1074646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299","reference_id":"741299","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"},{"reference_url":"https://security.gentoo.org/glsa/201408-02","reference_id":"GLSA-201408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-02"},{"reference_url":"https://usn.ubuntu.com/2148-1/","reference_id":"USN-2148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-2240"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=json","vulnerability_id":"VCID-73d5-ezt5-87eh","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9663","reference_id":"","reference_type":"","scores":[{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.8563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85688","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191085","reference_id":"1191085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191085"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9663"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=json","vulnerability_id":"VCID-73e1-scax-8ugj","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9675","reference_id":"","reference_type":"","scores":[{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84142","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84182","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191192","reference_id":"1191192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9675"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=json","vulnerability_id":"VCID-ask2-xeb7-7qbk","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9671","reference_id":"","reference_type":"","scores":[{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.86989","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87032","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.8704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87042","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87085","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191094","reference_id":"1191094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9671"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=json","vulnerability_id":"VCID-fp2p-5ymf-wffj","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9669","reference_id":"","reference_type":"","scores":[{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.8511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.8514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85144","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191092","reference_id":"1191092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191092"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9669"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38523?format=json","vulnerability_id":"VCID-gtka-sbgw-tuf5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9665","reference_id":"","reference_type":"","scores":[{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88921","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88941","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191087","reference_id":"1191087","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191087"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9665"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=json","vulnerability_id":"VCID-jg4p-nv1j-fyb9","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9670","reference_id":"","reference_type":"","scores":[{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89765","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.8977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.8978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89796","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191093","reference_id":"1191093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9670"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38501?format=json","vulnerability_id":"VCID-jn9w-2axj-8ke5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9659","reference_id":"","reference_type":"","scores":[{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86208","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86302","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191081","reference_id":"1191081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191081"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084","reference_id":"773084","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9659"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=json","vulnerability_id":"VCID-nakp-vmxa-akey","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9664","reference_id":"","reference_type":"","scores":[{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.7851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78591","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191086","reference_id":"1191086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191086"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9664"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38533?format=json","vulnerability_id":"VCID-nfp7-sjcv-wkfv","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9668","reference_id":"","reference_type":"","scores":[{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82336","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.8235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82414","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82409","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82445","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82449","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82484","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191091","reference_id":"1191091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9668"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=json","vulnerability_id":"VCID-p2yw-ksc4-jfe9","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9660","reference_id":"","reference_type":"","scores":[{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89564","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89569","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191082","reference_id":"1191082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191082"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9660"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=json","vulnerability_id":"VCID-p8h9-9xku-hbhv","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9666","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80671","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191089","reference_id":"1191089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191089"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9666"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=json","vulnerability_id":"VCID-pznp-81q7-z3d4","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9658","reference_id":"","reference_type":"","scores":[{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191080","reference_id":"1191080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9658"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=json","vulnerability_id":"VCID-th47-m45d-m7dk","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9667","reference_id":"","reference_type":"","scores":[{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83865","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191090","reference_id":"1191090","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191090"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9667"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86356?format=json","vulnerability_id":"VCID-tmb5-g2ua-ekek","summary":"freetype: OOB stack-based read/write in cf2_hintmap_build()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2241","reference_id":"","reference_type":"","scores":[{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.6992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.6997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69992","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.70042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.70051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7005","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646","reference_id":"1074646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299","reference_id":"741299","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"},{"reference_url":"https://usn.ubuntu.com/2148-1/","reference_id":"USN-2148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-2241"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=json","vulnerability_id":"VCID-tu7r-tsp8-73ew","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9673","reference_id":"","reference_type":"","scores":[{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88707","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88717","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88734","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88787","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88793","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191096","reference_id":"1191096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191096"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9673"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=json","vulnerability_id":"VCID-u15r-u7zz-17ad","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9672","reference_id":"","reference_type":"","scores":[{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89327","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.8938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89376","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.894","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191095","reference_id":"1191095","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191095"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9672"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=json","vulnerability_id":"VCID-uh3u-pzzg-fkgg","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9661","reference_id":"","reference_type":"","scores":[{"value":"0.03613","scoring_system":"epss","scoring_elements":"0.87822","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.8961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191083","reference_id":"1191083","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191083"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9661"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=json","vulnerability_id":"VCID-uhnk-v91u-p7e5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9656","reference_id":"","reference_type":"","scores":[{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8527","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85301","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191078","reference_id":"1191078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191078"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9656"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}