{"url":"http://public2.vulnerablecode.io/api/packages/127753?format=json","purl":"pkg:rpm/redhat/freetype@2.1.4-15?arch=el3","type":"rpm","namespace":"redhat","name":"freetype","version":"2.1.4-15","qualifiers":{"arch":"el3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=json","vulnerability_id":"VCID-3xz8-4wu5-fugq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500","reference_id":"","reference_type":"","scores":[{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85873","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85822","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8586","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30263","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30263"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167","reference_id":"613167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500","reference_id":"CVE-2010-2500","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2500"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=json","vulnerability_id":"VCID-57th-r73p-a3fy","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127912955808467&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127912955808467&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527","reference_id":"","reference_type":"","scores":[{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84954","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.849","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84939","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527"},{"reference_url":"http://savannah.nongnu.org/bugs/?30054","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.nongnu.org/bugs/?30054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557","reference_id":"614557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527","reference_id":"CVE-2010-2527","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2527"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=json","vulnerability_id":"VCID-gmk4-9sks-s3a5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541","reference_id":"","reference_type":"","scores":[{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.8933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89343","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89341","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89352","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89299","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342","reference_id":"617342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541","reference_id":"CVE-2010-2541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[],"aliases":["CVE-2010-2541"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5"}],"fixing_vulnerabilities":[],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.1.4-15%3Farch=el3"}