{"url":"http://public2.vulnerablecode.io/api/packages/127652?format=json","purl":"pkg:rpm/redhat/freetype@2.2.1-28?arch=el5_5","type":"rpm","namespace":"redhat","name":"freetype","version":"2.2.1-28","qualifiers":{"arch":"el5_5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=json","vulnerability_id":"VCID-4wp3-qsuc-1kh9","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806","reference_id":"","reference_type":"","scores":[{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92781","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92833","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92837","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30656","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30656"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980","reference_id":"621980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806","reference_id":"CVE-2010-2806","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2806"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35799?format=json","vulnerability_id":"VCID-7698-fwj1-fufd","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3311","reference_id":"","reference_type":"","scores":[{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87939","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87936","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87893","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87923","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04785","scoring_system":"epss","scoring_elements":"0.89433","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"http://www.debian.org/security/2010/dsa-2116","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:201","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:201"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/43700","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43700"},{"reference_url":"http://www.ubuntu.com/usn/USN-1013-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1013-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=623625","reference_id":"623625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=623625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3311","reference_id":"CVE-2010-3311","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3311"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/1013-1/","reference_id":"USN-1013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1013-1/"}],"fixed_packages":[],"aliases":["CVE-2010-3311"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=json","vulnerability_id":"VCID-cwfg-1d6f-hfgg","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128110167119337&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128110167119337&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808","reference_id":"","reference_type":"","scores":[{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92032","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91977","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92015","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92024","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30658","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30658"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907","reference_id":"621907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808","reference_id":"CVE-2010-2808","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2808"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=json","vulnerability_id":"VCID-gcht-dzky-fbay","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054","reference_id":"","reference_type":"","scores":[{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8835","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88298","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88328","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.securityfocus.com/bid/42621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42621"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632","reference_id":"625632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054","reference_id":"CVE-2010-3054","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"}],"fixed_packages":[],"aliases":["CVE-2010-3054"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay"}],"fixing_vulnerabilities":[],"risk_score":"4.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.2.1-28%3Farch=el5_5"}