{"url":"http://public2.vulnerablecode.io/api/packages/127752?format=json","purl":"pkg:rpm/redhat/freetype@2.2.1-25?arch=el5_5","type":"rpm","namespace":"redhat","name":"freetype","version":"2.2.1-25","qualifiers":{"arch":"el5_5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=json","vulnerability_id":"VCID-3xz8-4wu5-fugq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500","reference_id":"","reference_type":"","scores":[{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85822","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30263","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30263"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167","reference_id":"613167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500","reference_id":"CVE-2010-2500","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2500"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=json","vulnerability_id":"VCID-57th-r73p-a3fy","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127912955808467&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127912955808467&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527","reference_id":"","reference_type":"","scores":[{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.849","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527"},{"reference_url":"http://savannah.nongnu.org/bugs/?30054","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.nongnu.org/bugs/?30054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557","reference_id":"614557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527","reference_id":"CVE-2010-2527","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2527"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=json","vulnerability_id":"VCID-ahxa-yjxp-a7en","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2499","reference_id":"","reference_type":"","scores":[{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.8734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87412","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87434","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30248","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30248"},{"reference_url":"https://savannah.nongnu.org/bugs/?30249","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30249"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613162","reference_id":"613162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613162"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2499","reference_id":"CVE-2010-2499","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2499"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2499"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=json","vulnerability_id":"VCID-gmk4-9sks-s3a5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541","reference_id":"","reference_type":"","scores":[{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.8933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89299","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342","reference_id":"617342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541","reference_id":"CVE-2010-2541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2541"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=json","vulnerability_id":"VCID-pzsb-3h3d-t7hq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2498","reference_id":"","reference_type":"","scores":[{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85822","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30106","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30106"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613160","reference_id":"613160","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613160"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2498","reference_id":"CVE-2010-2498","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2498"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2498"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=json","vulnerability_id":"VCID-wbve-vpw4-tqhe","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2519","reference_id":"","reference_type":"","scores":[{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89105","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89114","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.8916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.8917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30306","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30306"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613194","reference_id":"613194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613194"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2519","reference_id":"CVE-2010-2519","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2519"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2519"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe"}],"fixing_vulnerabilities":[],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.2.1-25%3Farch=el5_5"}