Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/freetype@2.2.1-28?arch=el5_5
Typerpm
Namespaceredhat
Namefreetype
Version2.2.1-28
Qualifiers
arch el5_5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4wp3-qsuc-1kh9
vulnerability_id VCID-4wp3-qsuc-1kh9
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
reference_id
reference_type
scores
0
value 0.09383
scoring_system epss
scoring_elements 0.92833
published_at 2026-05-09T12:55:00Z
1
value 0.09383
scoring_system epss
scoring_elements 0.92754
published_at 2026-04-01T12:55:00Z
2
value 0.09383
scoring_system epss
scoring_elements 0.9276
published_at 2026-04-02T12:55:00Z
3
value 0.09383
scoring_system epss
scoring_elements 0.92765
published_at 2026-04-04T12:55:00Z
4
value 0.09383
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-07T12:55:00Z
5
value 0.09383
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-08T12:55:00Z
6
value 0.09383
scoring_system epss
scoring_elements 0.92776
published_at 2026-04-09T12:55:00Z
7
value 0.09383
scoring_system epss
scoring_elements 0.92782
published_at 2026-04-11T12:55:00Z
8
value 0.09383
scoring_system epss
scoring_elements 0.9278
published_at 2026-04-12T12:55:00Z
9
value 0.09383
scoring_system epss
scoring_elements 0.92781
published_at 2026-04-13T12:55:00Z
10
value 0.09383
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-18T12:55:00Z
11
value 0.09383
scoring_system epss
scoring_elements 0.92795
published_at 2026-04-21T12:55:00Z
12
value 0.09383
scoring_system epss
scoring_elements 0.92802
published_at 2026-04-26T12:55:00Z
13
value 0.09383
scoring_system epss
scoring_elements 0.92798
published_at 2026-04-29T12:55:00Z
14
value 0.09383
scoring_system epss
scoring_elements 0.92808
published_at 2026-05-05T12:55:00Z
15
value 0.09383
scoring_system epss
scoring_elements 0.92821
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2806
7
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806
9
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
10
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
11
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
12
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
13
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
14
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30656
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30656
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621980
reference_id 621980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621980
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
reference_id CVE-2010-2806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2806
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
40
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
41
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
42
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
aliases CVE-2010-2806
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9
1
url VCID-7698-fwj1-fufd
vulnerability_id VCID-7698-fwj1-fufd
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
reference_id
reference_type
scores
0
value 0.03648
scoring_system epss
scoring_elements 0.87939
published_at 2026-05-09T12:55:00Z
1
value 0.03648
scoring_system epss
scoring_elements 0.87908
published_at 2026-05-05T12:55:00Z
2
value 0.03648
scoring_system epss
scoring_elements 0.87923
published_at 2026-05-07T12:55:00Z
3
value 0.03648
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-02T12:55:00Z
4
value 0.03648
scoring_system epss
scoring_elements 0.87831
published_at 2026-04-04T12:55:00Z
5
value 0.03648
scoring_system epss
scoring_elements 0.87835
published_at 2026-04-07T12:55:00Z
6
value 0.03648
scoring_system epss
scoring_elements 0.87856
published_at 2026-04-08T12:55:00Z
7
value 0.03648
scoring_system epss
scoring_elements 0.87863
published_at 2026-04-09T12:55:00Z
8
value 0.03648
scoring_system epss
scoring_elements 0.87874
published_at 2026-04-11T12:55:00Z
9
value 0.03648
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-12T12:55:00Z
10
value 0.03648
scoring_system epss
scoring_elements 0.87866
published_at 2026-04-13T12:55:00Z
11
value 0.03648
scoring_system epss
scoring_elements 0.8788
published_at 2026-04-16T12:55:00Z
12
value 0.03648
scoring_system epss
scoring_elements 0.87879
published_at 2026-04-18T12:55:00Z
13
value 0.03648
scoring_system epss
scoring_elements 0.87876
published_at 2026-04-21T12:55:00Z
14
value 0.03648
scoring_system epss
scoring_elements 0.87893
published_at 2026-04-24T12:55:00Z
15
value 0.03648
scoring_system epss
scoring_elements 0.87899
published_at 2026-04-26T12:55:00Z
16
value 0.03648
scoring_system epss
scoring_elements 0.87896
published_at 2026-04-29T12:55:00Z
17
value 0.04785
scoring_system epss
scoring_elements 0.89433
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311
4
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
5
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
6
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
7
reference_url http://www.debian.org/security/2010/dsa-2116
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2116
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:201
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
10
reference_url http://www.securityfocus.com/bid/43700
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43700
11
reference_url http://www.ubuntu.com/usn/USN-1013-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1013-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=623625
reference_id 623625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=623625
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
reference_id CVE-2010-3311
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3311
43
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
44
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
45
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
46
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
47
reference_url https://usn.ubuntu.com/1013-1/
reference_id USN-1013-1
reference_type
scores
url https://usn.ubuntu.com/1013-1/
fixed_packages
aliases CVE-2010-3311
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd
2
url VCID-cwfg-1d6f-hfgg
vulnerability_id VCID-cwfg-1d6f-hfgg
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
4
reference_url http://marc.info/?l=oss-security&m=128110167119337&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128110167119337&w=2
5
reference_url http://marc.info/?l=oss-security&m=128111955616772&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128111955616772&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
reference_id
reference_type
scores
0
value 0.07802
scoring_system epss
scoring_elements 0.92024
published_at 2026-05-09T12:55:00Z
1
value 0.07802
scoring_system epss
scoring_elements 0.91937
published_at 2026-04-01T12:55:00Z
2
value 0.07802
scoring_system epss
scoring_elements 0.91945
published_at 2026-04-02T12:55:00Z
3
value 0.07802
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-04T12:55:00Z
4
value 0.07802
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-07T12:55:00Z
5
value 0.07802
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-08T12:55:00Z
6
value 0.07802
scoring_system epss
scoring_elements 0.91977
published_at 2026-04-09T12:55:00Z
7
value 0.07802
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-11T12:55:00Z
8
value 0.07802
scoring_system epss
scoring_elements 0.91979
published_at 2026-04-12T12:55:00Z
9
value 0.07802
scoring_system epss
scoring_elements 0.91976
published_at 2026-04-13T12:55:00Z
10
value 0.07802
scoring_system epss
scoring_elements 0.91995
published_at 2026-04-16T12:55:00Z
11
value 0.07802
scoring_system epss
scoring_elements 0.91993
published_at 2026-04-24T12:55:00Z
12
value 0.07802
scoring_system epss
scoring_elements 0.91989
published_at 2026-04-29T12:55:00Z
13
value 0.07802
scoring_system epss
scoring_elements 0.91992
published_at 2026-04-26T12:55:00Z
14
value 0.07802
scoring_system epss
scoring_elements 0.92002
published_at 2026-05-05T12:55:00Z
15
value 0.07802
scoring_system epss
scoring_elements 0.92015
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2808
8
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808
10
reference_url http://secunia.com/advisories/40816
reference_id
reference_type
scores
url http://secunia.com/advisories/40816
11
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
12
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
13
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
14
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
15
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
16
reference_url https://savannah.nongnu.org/bugs/?30658
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30658
17
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
18
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
19
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
20
reference_url http://www.redhat.com/support/errata/RHSA-2010-0864.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0864.html
21
reference_url http://www.securityfocus.com/bid/42285
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42285
22
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
23
reference_url http://www.vupen.com/english/advisories/2010/2018
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2018
24
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
25
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
26
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=621907
reference_id 621907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=621907
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
reference_id CVE-2010-2808
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2808
38
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
39
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
40
reference_url https://access.redhat.com/errata/RHSA-2010:0864
reference_id RHSA-2010:0864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0864
41
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
aliases CVE-2010-2808
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg
3
url VCID-gcht-dzky-fbay
vulnerability_id VCID-gcht-dzky-fbay
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
reference_id
reference_type
scores
0
value 0.03893
scoring_system epss
scoring_elements 0.8834
published_at 2026-05-09T12:55:00Z
1
value 0.03893
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-01T12:55:00Z
2
value 0.03893
scoring_system epss
scoring_elements 0.88214
published_at 2026-04-02T12:55:00Z
3
value 0.03893
scoring_system epss
scoring_elements 0.88229
published_at 2026-04-04T12:55:00Z
4
value 0.03893
scoring_system epss
scoring_elements 0.88235
published_at 2026-04-07T12:55:00Z
5
value 0.03893
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-08T12:55:00Z
6
value 0.03893
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-09T12:55:00Z
7
value 0.03893
scoring_system epss
scoring_elements 0.88272
published_at 2026-04-11T12:55:00Z
8
value 0.03893
scoring_system epss
scoring_elements 0.88264
published_at 2026-04-12T12:55:00Z
9
value 0.03893
scoring_system epss
scoring_elements 0.88263
published_at 2026-04-13T12:55:00Z
10
value 0.03893
scoring_system epss
scoring_elements 0.88277
published_at 2026-04-16T12:55:00Z
11
value 0.03893
scoring_system epss
scoring_elements 0.88276
published_at 2026-04-18T12:55:00Z
12
value 0.03893
scoring_system epss
scoring_elements 0.88275
published_at 2026-04-21T12:55:00Z
13
value 0.03893
scoring_system epss
scoring_elements 0.88293
published_at 2026-04-24T12:55:00Z
14
value 0.03893
scoring_system epss
scoring_elements 0.88298
published_at 2026-04-26T12:55:00Z
15
value 0.03893
scoring_system epss
scoring_elements 0.88301
published_at 2026-04-29T12:55:00Z
16
value 0.03893
scoring_system epss
scoring_elements 0.88312
published_at 2026-05-05T12:55:00Z
17
value 0.03893
scoring_system epss
scoring_elements 0.88328
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3054
5
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054
7
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
8
reference_url http://secunia.com/advisories/42317
reference_id
reference_type
scores
url http://secunia.com/advisories/42317
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url https://rhn.redhat.com/errata/RHSA-2010-0736.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0736.html
11
reference_url https://rhn.redhat.com/errata/RHSA-2010-0737.html
reference_id
reference_type
scores
url https://rhn.redhat.com/errata/RHSA-2010-0737.html
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
14
reference_url http://support.apple.com/kb/HT4457
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4457
15
reference_url http://www.securityfocus.com/bid/42621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/42621
16
reference_url http://www.vupen.com/english/advisories/2010/3045
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3045
17
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=625632
reference_id 625632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=625632
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
reference_id CVE-2010-3054
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3054
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0736
reference_id RHSA-2010:0736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0736
28
reference_url https://access.redhat.com/errata/RHSA-2010:0737
reference_id RHSA-2010:0737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0737
fixed_packages
aliases CVE-2010-3054
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay
Fixing_vulnerabilities
Risk_score4.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.2.1-28%3Farch=el5_5