Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/freetype@2.1.9-14.el4?arch=8
Typerpm
Namespaceredhat
Namefreetype
Version2.1.9-14.el4
Qualifiers
arch 8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3xz8-4wu5-fugq
vulnerability_id VCID-3xz8-4wu5-fugq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-29T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
12
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
13
value 0.02649
scoring_system epss
scoring_elements 0.85794
published_at 2026-04-24T12:55:00Z
14
value 0.02649
scoring_system epss
scoring_elements 0.85804
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2500
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30263
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30263
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613167
reference_id 613167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613167
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
reference_id CVE-2010-2500
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2500
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
aliases CVE-2010-2500
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq
1
url VCID-57th-r73p-a3fy
vulnerability_id VCID-57th-r73p-a3fy
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec
1
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
2
reference_url http://marc.info/?l=oss-security&m=127912955808467&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127912955808467&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
reference_id
reference_type
scores
0
value 0.02329
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-29T12:55:00Z
1
value 0.02329
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-01T12:55:00Z
2
value 0.02329
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-02T12:55:00Z
3
value 0.02329
scoring_system epss
scoring_elements 0.84786
published_at 2026-04-04T12:55:00Z
4
value 0.02329
scoring_system epss
scoring_elements 0.84788
published_at 2026-04-07T12:55:00Z
5
value 0.02329
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-08T12:55:00Z
6
value 0.02329
scoring_system epss
scoring_elements 0.84817
published_at 2026-04-09T12:55:00Z
7
value 0.02329
scoring_system epss
scoring_elements 0.84835
published_at 2026-04-11T12:55:00Z
8
value 0.02329
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-12T12:55:00Z
9
value 0.02329
scoring_system epss
scoring_elements 0.84827
published_at 2026-04-13T12:55:00Z
10
value 0.02329
scoring_system epss
scoring_elements 0.84848
published_at 2026-04-16T12:55:00Z
11
value 0.02329
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-18T12:55:00Z
12
value 0.02329
scoring_system epss
scoring_elements 0.84847
published_at 2026-04-21T12:55:00Z
13
value 0.02329
scoring_system epss
scoring_elements 0.84873
published_at 2026-04-24T12:55:00Z
14
value 0.02329
scoring_system epss
scoring_elements 0.84884
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2527
5
reference_url http://savannah.nongnu.org/bugs/?30054
reference_id
reference_type
scores
url http://savannah.nongnu.org/bugs/?30054
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527
7
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
8
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
9
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
12
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=614557
reference_id 614557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=614557
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
reference_id CVE-2010-2527
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2527
22
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
23
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
24
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
25
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
aliases CVE-2010-2527
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy
2
url VCID-ahxa-yjxp-a7en
vulnerability_id VCID-ahxa-yjxp-a7en
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
reference_id
reference_type
scores
0
value 0.03379
scoring_system epss
scoring_elements 0.87419
published_at 2026-04-29T12:55:00Z
1
value 0.03379
scoring_system epss
scoring_elements 0.8733
published_at 2026-04-01T12:55:00Z
2
value 0.03379
scoring_system epss
scoring_elements 0.8734
published_at 2026-04-02T12:55:00Z
3
value 0.03379
scoring_system epss
scoring_elements 0.87355
published_at 2026-04-04T12:55:00Z
4
value 0.03379
scoring_system epss
scoring_elements 0.87356
published_at 2026-04-07T12:55:00Z
5
value 0.03379
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-08T12:55:00Z
6
value 0.03379
scoring_system epss
scoring_elements 0.87381
published_at 2026-04-09T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87393
published_at 2026-04-11T12:55:00Z
8
value 0.03379
scoring_system epss
scoring_elements 0.87388
published_at 2026-04-12T12:55:00Z
9
value 0.03379
scoring_system epss
scoring_elements 0.87384
published_at 2026-04-13T12:55:00Z
10
value 0.03379
scoring_system epss
scoring_elements 0.87399
published_at 2026-04-16T12:55:00Z
11
value 0.03379
scoring_system epss
scoring_elements 0.87402
published_at 2026-04-18T12:55:00Z
12
value 0.03379
scoring_system epss
scoring_elements 0.87396
published_at 2026-04-21T12:55:00Z
13
value 0.03379
scoring_system epss
scoring_elements 0.87412
published_at 2026-04-24T12:55:00Z
14
value 0.03379
scoring_system epss
scoring_elements 0.87418
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2499
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30248
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30248
12
reference_url https://savannah.nongnu.org/bugs/?30249
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30249
13
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
14
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
17
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613162
reference_id 613162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613162
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
reference_id CVE-2010-2499
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2499
28
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
29
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
30
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
aliases CVE-2010-2499
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en
3
url VCID-gmk4-9sks-s3a5
vulnerability_id VCID-gmk4-9sks-s3a5
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
reference_id
reference_type
scores
url http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
reference_id
reference_type
scores
0
value 0.04292
scoring_system epss
scoring_elements 0.88809
published_at 2026-04-01T12:55:00Z
1
value 0.04292
scoring_system epss
scoring_elements 0.88818
published_at 2026-04-02T12:55:00Z
2
value 0.04292
scoring_system epss
scoring_elements 0.88834
published_at 2026-04-04T12:55:00Z
3
value 0.04292
scoring_system epss
scoring_elements 0.88837
published_at 2026-04-07T12:55:00Z
4
value 0.04292
scoring_system epss
scoring_elements 0.88854
published_at 2026-04-08T12:55:00Z
5
value 0.04292
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-09T12:55:00Z
6
value 0.04292
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-11T12:55:00Z
7
value 0.04622
scoring_system epss
scoring_elements 0.89299
published_at 2026-04-26T12:55:00Z
8
value 0.04622
scoring_system epss
scoring_elements 0.89272
published_at 2026-04-12T12:55:00Z
9
value 0.04622
scoring_system epss
scoring_elements 0.89303
published_at 2026-04-29T12:55:00Z
10
value 0.04622
scoring_system epss
scoring_elements 0.89269
published_at 2026-04-13T12:55:00Z
11
value 0.04622
scoring_system epss
scoring_elements 0.89282
published_at 2026-04-18T12:55:00Z
12
value 0.04622
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-21T12:55:00Z
13
value 0.04622
scoring_system epss
scoring_elements 0.89295
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2541
3
reference_url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541
5
reference_url http://secunia.com/advisories/40982
reference_id
reference_type
scores
url http://secunia.com/advisories/40982
6
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
7
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
8
reference_url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
reference_id
reference_type
scores
url http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view
9
reference_url http://www.redhat.com/support/errata/RHSA-2010-0577.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0577.html
10
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
11
reference_url http://www.ubuntu.com/usn/USN-972-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-972-1
12
reference_url http://www.vupen.com/english/advisories/2010/2106
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2106
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=617342
reference_id 617342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=617342
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
reference_id CVE-2010-2541
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2541
21
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
22
reference_url https://access.redhat.com/errata/RHSA-2010:0577
reference_id RHSA-2010:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0577
23
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
24
reference_url https://usn.ubuntu.com/972-1/
reference_id USN-972-1
reference_type
scores
url https://usn.ubuntu.com/972-1/
fixed_packages
aliases CVE-2010-2541
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5
4
url VCID-pzsb-3h3d-t7hq
vulnerability_id VCID-pzsb-3h3d-t7hq
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2
1
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
2
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
3
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
4
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
reference_id
reference_type
scores
0
value 0.02649
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-29T12:55:00Z
1
value 0.02649
scoring_system epss
scoring_elements 0.8568
published_at 2026-04-01T12:55:00Z
2
value 0.02649
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-02T12:55:00Z
3
value 0.02649
scoring_system epss
scoring_elements 0.8571
published_at 2026-04-04T12:55:00Z
4
value 0.02649
scoring_system epss
scoring_elements 0.85717
published_at 2026-04-07T12:55:00Z
5
value 0.02649
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-08T12:55:00Z
6
value 0.02649
scoring_system epss
scoring_elements 0.85747
published_at 2026-04-09T12:55:00Z
7
value 0.02649
scoring_system epss
scoring_elements 0.85762
published_at 2026-04-11T12:55:00Z
8
value 0.02649
scoring_system epss
scoring_elements 0.85758
published_at 2026-04-12T12:55:00Z
9
value 0.02649
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-13T12:55:00Z
10
value 0.02649
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-16T12:55:00Z
11
value 0.02649
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-18T12:55:00Z
12
value 0.02649
scoring_system epss
scoring_elements 0.85771
published_at 2026-04-21T12:55:00Z
13
value 0.02649
scoring_system epss
scoring_elements 0.85794
published_at 2026-04-24T12:55:00Z
14
value 0.02649
scoring_system epss
scoring_elements 0.85804
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2498
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498
8
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
9
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
10
reference_url https://savannah.nongnu.org/bugs/?30106
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30106
11
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
12
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
14
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
15
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613160
reference_id 613160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613160
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
reference_id CVE-2010-2498
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2498
26
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
27
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
28
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
aliases CVE-2010-2498
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq
5
url VCID-wbve-vpw4-tqhe
vulnerability_id VCID-wbve-vpw4-tqhe
summary
Multiple vulnerabilities have been found in FreeType, allowing
    remote attackers to possibly execute arbitrary code or cause a Denial of
    Service.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b
1
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d
2
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
3
reference_url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html
4
reference_url http://marc.info/?l=oss-security&m=127905701201340&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127905701201340&w=2
5
reference_url http://marc.info/?l=oss-security&m=127909326909362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=127909326909362&w=2
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
reference_id
reference_type
scores
0
value 0.0452
scoring_system epss
scoring_elements 0.89192
published_at 2026-04-29T12:55:00Z
1
value 0.0452
scoring_system epss
scoring_elements 0.89105
published_at 2026-04-01T12:55:00Z
2
value 0.0452
scoring_system epss
scoring_elements 0.89114
published_at 2026-04-02T12:55:00Z
3
value 0.0452
scoring_system epss
scoring_elements 0.89128
published_at 2026-04-04T12:55:00Z
4
value 0.0452
scoring_system epss
scoring_elements 0.89131
published_at 2026-04-07T12:55:00Z
5
value 0.0452
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-08T12:55:00Z
6
value 0.0452
scoring_system epss
scoring_elements 0.89154
published_at 2026-04-09T12:55:00Z
7
value 0.0452
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-11T12:55:00Z
8
value 0.0452
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-12T12:55:00Z
9
value 0.0452
scoring_system epss
scoring_elements 0.89157
published_at 2026-04-13T12:55:00Z
10
value 0.0452
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-18T12:55:00Z
11
value 0.0452
scoring_system epss
scoring_elements 0.89167
published_at 2026-04-21T12:55:00Z
12
value 0.0452
scoring_system epss
scoring_elements 0.89183
published_at 2026-04-24T12:55:00Z
13
value 0.0452
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2519
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519
9
reference_url http://secunia.com/advisories/48951
reference_id
reference_type
scores
url http://secunia.com/advisories/48951
10
reference_url http://securitytracker.com/id?1024266
reference_id
reference_type
scores
url http://securitytracker.com/id?1024266
11
reference_url https://savannah.nongnu.org/bugs/?30306
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?30306
12
reference_url http://support.apple.com/kb/HT4435
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4435
13
reference_url http://www.debian.org/security/2010/dsa-2070
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2070
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:137
15
reference_url http://www.redhat.com/support/errata/RHSA-2010-0578.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0578.html
16
reference_url http://www.ubuntu.com/usn/USN-963-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-963-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613194
reference_id 613194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613194
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
reference_id CVE-2010-2519
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2519
27
reference_url https://security.gentoo.org/glsa/201201-09
reference_id GLSA-201201-09
reference_type
scores
url https://security.gentoo.org/glsa/201201-09
28
reference_url https://access.redhat.com/errata/RHSA-2010:0578
reference_id RHSA-2010:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0578
29
reference_url https://usn.ubuntu.com/963-1/
reference_id USN-963-1
reference_type
scores
url https://usn.ubuntu.com/963-1/
fixed_packages
aliases CVE-2010-2519
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe
Fixing_vulnerabilities
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.1.9-14.el4%3Farch=8