{"url":"http://public2.vulnerablecode.io/api/packages/571383?format=json","purl":"pkg:deb/debian/freetype@1.2-3","type":"deb","namespace":"debian","name":"freetype","version":"1.2-3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.12.1+dfsg-5+deb12u4","latest_non_vulnerable_version":"2.12.1+dfsg-5+deb12u4","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38514?format=json","vulnerability_id":"VCID-17au-pc1k-m7at","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9662","reference_id":"","reference_type":"","scores":[{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90103","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90106","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90146","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.9016","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90175","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05416","scoring_system":"epss","scoring_elements":"0.90173","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191084","reference_id":"1191084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9662"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-17au-pc1k-m7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=json","vulnerability_id":"VCID-1teu-tz69-dff8","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1128","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1128"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800584","reference_id":"800584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128","reference_id":"CVE-2012-1128","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1128"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38551?format=json","vulnerability_id":"VCID-1ws8-ww77-ybah","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9674","reference_id":"","reference_type":"","scores":[{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89864","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05124","scoring_system":"epss","scoring_elements":"0.89879","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191190","reference_id":"1191190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9674"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ws8-ww77-ybah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=json","vulnerability_id":"VCID-2fsn-uxp3-fbeg","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1130","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1130"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800587","reference_id":"800587","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130","reference_id":"CVE-2012-1130","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1130"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34274?format=json","vulnerability_id":"VCID-2kj7-a6r9-bfft","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1806","reference_id":"","reference_type":"","scores":[{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.8817","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88166","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03824","scoring_system":"epss","scoring_elements":"0.88171","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020238","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020238"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29640","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29640"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450768","reference_id":"450768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1806","reference_id":"CVE-2008-1806","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1806"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2008-1806"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=json","vulnerability_id":"VCID-38u1-6t8n-gqey","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1143","reference_id":"","reference_type":"","scores":[{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800606","reference_id":"800606","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143","reference_id":"CVE-2012-1143","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1143"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38494?format=json","vulnerability_id":"VCID-3jn7-t1f6-uyfr","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9657","reference_id":"","reference_type":"","scores":[{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191079","reference_id":"1191079","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191079"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9657"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3jn7-t1f6-uyfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35801?format=json","vulnerability_id":"VCID-3vb1-m8xt-kfcf","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=59eb9f8cfe7d1df379a2318316d1f04f80fba54a"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050965.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051231.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051251.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3855","reference_id":"","reference_type":"","scores":[{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88904","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88898","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04314","scoring_system":"epss","scoring_elements":"0.88931","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855"},{"reference_url":"http://secunia.com/advisories/42289","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42289"},{"reference_url":"http://secunia.com/advisories/42295","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42295"},{"reference_url":"http://secunia.com/advisories/43138","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43138"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://savannah.nongnu.org/bugs/?31310","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?31310"},{"reference_url":"http://support.apple.com/kb/HT4564","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4564"},{"reference_url":"http://support.apple.com/kb/HT4565","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4565"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://support.apple.com/kb/HT4802","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4802"},{"reference_url":"http://support.apple.com/kb/HT4803","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4803"},{"reference_url":"http://support.avaya.com/css/P8/documents/100122733","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100122733"},{"reference_url":"http://www.debian.org/security/2011/dsa-2155","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2155"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:235","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:235"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:236","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:236"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0889.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0889.html"},{"reference_url":"http://www.securityfocus.com/bid/44214","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44214"},{"reference_url":"http://www.securitytracker.com/id?1024745","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024745"},{"reference_url":"http://www.ubuntu.com/usn/USN-1013-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1013-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3037","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3037"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0246","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221","reference_id":"602221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=645275","reference_id":"645275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=645275"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3855","reference_id":"CVE-2010-3855","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3855"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0889","reference_id":"RHSA-2010:0889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0889"},{"reference_url":"https://usn.ubuntu.com/1013-1/","reference_id":"USN-1013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1013-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-3855"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vb1-m8xt-kfcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31560?format=json","vulnerability_id":"VCID-3wjn-8gnc-gkhr","summary":"Multiple vulnerabilities in FreeType might result in the remote execution\n    of arbitrary code.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"},{"reference_url":"http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178","reference_id":"","reference_type":"","scores":[],"url":"http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178"},{"reference_url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"},{"reference_url":"http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html"},{"reference_url":"http://osvdb.org/36509","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36509"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2754","reference_id":"","reference_type":"","scores":[{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97427","published_at":"2026-04-12T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.9744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.41922","scoring_system":"epss","scoring_elements":"0.97442","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2754"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=502565","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=502565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754"},{"reference_url":"http://secunia.com/advisories/25350","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25350"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25386","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25386"},{"reference_url":"http://secunia.com/advisories/25463","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25463"},{"reference_url":"http://secunia.com/advisories/25483","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25483"},{"reference_url":"http://secunia.com/advisories/25609","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25609"},{"reference_url":"http://secunia.com/advisories/25612","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25612"},{"reference_url":"http://secunia.com/advisories/25654","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25654"},{"reference_url":"http://secunia.com/advisories/25705","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25705"},{"reference_url":"http://secunia.com/advisories/25808","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25808"},{"reference_url":"http://secunia.com/advisories/25894","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25894"},{"reference_url":"http://secunia.com/advisories/25905","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25905"},{"reference_url":"http://secunia.com/advisories/26129","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26129"},{"reference_url":"http://secunia.com/advisories/26305","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26305"},{"reference_url":"http://secunia.com/advisories/28298","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28298"},{"reference_url":"http://secunia.com/advisories/30161","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30161"},{"reference_url":"http://secunia.com/advisories/35074","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35074"},{"reference_url":"http://secunia.com/advisories/35200","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35200"},{"reference_url":"http://secunia.com/advisories/35204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35204"},{"reference_url":"http://secunia.com/advisories/35233","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35233"},{"reference_url":"https://issues.rpath.com/browse/RPL-1390","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1390"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1"},{"reference_url":"http://support.apple.com/kb/HT3549","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3549"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html"},{"reference_url":"http://www.debian.org/security/2007/dsa-1302","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1302"},{"reference_url":"http://www.debian.org/security/2007/dsa-1334","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1334"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:121"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_41_freetype2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_41_freetype2.html"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0403.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0403.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-1062.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-1062.html"},{"reference_url":"http://www.securityfocus.com/archive/1/469463/100/200/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/469463/100/200/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/471286/30/6180/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/471286/30/6180/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24074","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24074"},{"reference_url":"http://www.securitytracker.com/id?1018088","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018088"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.ubuntu.com/usn/usn-466-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-466-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA09-133A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1894","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1894"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2229","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2229"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0049","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0049"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1297","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1297"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=240200","reference_id":"240200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=240200"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625","reference_id":"425625","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2754","reference_id":"CVE-2007-2754","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2754"},{"reference_url":"https://security.gentoo.org/glsa/200705-22","reference_id":"GLSA-200705-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-22"},{"reference_url":"https://security.gentoo.org/glsa/200707-02","reference_id":"GLSA-200707-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-02"},{"reference_url":"https://security.gentoo.org/glsa/201006-01","reference_id":"GLSA-201006-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0403","reference_id":"RHSA-2007:0403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0329","reference_id":"RHSA-2009:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1062","reference_id":"RHSA-2009:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1062"},{"reference_url":"https://usn.ubuntu.com/466-1/","reference_id":"USN-466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/466-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2007-2754"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjn-8gnc-gkhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=json","vulnerability_id":"VCID-3xz8-4wu5-fugq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500","reference_id":"","reference_type":"","scores":[{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2500"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30263","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30263"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167","reference_id":"613167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613167"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500","reference_id":"CVE-2010-2500","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2500"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2500"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37481?format=json","vulnerability_id":"VCID-468g-dxsr-8yer","summary":"A vulnerability in FreeType could result in execution of arbitrary\n    code or Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2240","reference_id":"","reference_type":"","scores":[{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.8304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83065","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83142","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01867","scoring_system":"epss","scoring_elements":"0.83156","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646","reference_id":"1074646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299","reference_id":"741299","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"},{"reference_url":"https://security.gentoo.org/glsa/201408-02","reference_id":"GLSA-201408-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-02"},{"reference_url":"https://usn.ubuntu.com/2148-1/","reference_id":"USN-2148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-2240"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-468g-dxsr-8yer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35794?format=json","vulnerability_id":"VCID-48rk-qwp7-j7a8","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2807","reference_id":"","reference_type":"","scores":[{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.8993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2807"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://savannah.nongnu.org/bugs/?30657","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30657"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625627","reference_id":"625627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625627"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2807","reference_id":"CVE-2010-2807","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2807"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2807"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=json","vulnerability_id":"VCID-4wp3-qsuc-1kh9","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806","reference_id":"","reference_type":"","scores":[{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92781","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92802","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30656","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30656"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980","reference_id":"621980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806","reference_id":"CVE-2010-2806","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2806"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=json","vulnerability_id":"VCID-57th-r73p-a3fy","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127912955808467&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127912955808467&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527","reference_id":"","reference_type":"","scores":[{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02329","scoring_system":"epss","scoring_elements":"0.84884","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2527"},{"reference_url":"http://savannah.nongnu.org/bugs/?30054","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.nongnu.org/bugs/?30054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557","reference_id":"614557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=614557"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527","reference_id":"CVE-2010-2527","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2527"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2527"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=json","vulnerability_id":"VCID-5rpx-8t3t-syhv","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1139","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800598","reference_id":"800598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139","reference_id":"CVE-2012-1139","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1139"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90673?format=json","vulnerability_id":"VCID-5z69-3ht1-kfeh","summary":"CVE-2007-3506 Emboldden rendering  with a sbit font makes glibc detected.","references":[{"reference_url":"http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18","reference_id":"","reference_type":"","scores":[],"url":"http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3506.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3506","reference_id":"","reference_type":"","scores":[{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72982","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72998","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73008","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73041","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73052","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3506"},{"reference_url":"http://savannah.nongnu.org/bugs/index.php?19536","reference_id":"","reference_type":"","scores":[],"url":"http://savannah.nongnu.org/bugs/index.php?19536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3506"},{"reference_url":"http://secunia.com/advisories/25884","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25884"},{"reference_url":"https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970","reference_id":"","reference_type":"","scores":[],"url":"https://sourceforge.net/project/shownotes.php?group_id=3157&release_id=499970"},{"reference_url":"http://www.securityfocus.com/bid/24708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24708"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=235479","reference_id":"235479","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=235479"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013","reference_id":"432013","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=432013"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3506","reference_id":"CVE-2007-3506","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3506"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2007-3506"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5z69-3ht1-kfeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=json","vulnerability_id":"VCID-613j-8z2t-t3au","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1129","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1129"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800585","reference_id":"800585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129","reference_id":"CVE-2012-1129","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1129"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35800?format=json","vulnerability_id":"VCID-64dt-nnzb-mkfc","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0edf0986f3be570f5bf90ff245a85c1675f5c9a4"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3814","reference_id":"","reference_type":"","scores":[{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90381","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90332","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90372","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.9037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90386","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05648","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/43138","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43138"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://security-tracker.debian.org/tracker/CVE-2010-3814","reference_id":"","reference_type":"","scores":[],"url":"http://security-tracker.debian.org/tracker/CVE-2010-3814"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4581","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4581"},{"reference_url":"http://www.debian.org/security/2011/dsa-2155","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2155"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:236","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:236"},{"reference_url":"http://www.securityfocus.com/bid/44643","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44643"},{"reference_url":"http://www.securitytracker.com/id?1024767","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024767"},{"reference_url":"http://www.ubuntu.com/usn/USN-1013-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1013-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0246","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221","reference_id":"602221","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602221"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3814","reference_id":"CVE-2010-3814","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3814"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://usn.ubuntu.com/1013-1/","reference_id":"USN-1013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1013-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-3814"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-64dt-nnzb-mkfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=json","vulnerability_id":"VCID-6pzj-1sgf-zbbr","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1144","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1144"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800607","reference_id":"800607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144","reference_id":"CVE-2012-1144","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1144"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=json","vulnerability_id":"VCID-6xf8-49hw-hfaf","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10244","reference_id":"","reference_type":"","scores":[{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.6658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66612","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429965","reference_id":"1429965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429965"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971","reference_id":"856971","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3237-1/","reference_id":"USN-3237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3237-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2016-10244"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=json","vulnerability_id":"VCID-6z8y-k8vw-nudd","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1142","reference_id":"","reference_type":"","scores":[{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1142"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800604","reference_id":"800604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142","reference_id":"CVE-2012-1142","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1142"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38517?format=json","vulnerability_id":"VCID-73d5-ezt5-87eh","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9663","reference_id":"","reference_type":"","scores":[{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85571","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.8563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85654","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02607","scoring_system":"epss","scoring_elements":"0.85688","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191085","reference_id":"1191085","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191085"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9663"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73d5-ezt5-87eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38553?format=json","vulnerability_id":"VCID-73e1-scax-8ugj","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9675","reference_id":"","reference_type":"","scores":[{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84142","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.8417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02114","scoring_system":"epss","scoring_elements":"0.84182","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191192","reference_id":"1191192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9675"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73e1-scax-8ugj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35799?format=json","vulnerability_id":"VCID-7698-fwj1-fufd","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3311.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3311","reference_id":"","reference_type":"","scores":[{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87893","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87835","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04785","scoring_system":"epss","scoring_elements":"0.89433","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"http://www.debian.org/security/2010/dsa-2116","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2116"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:201","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:201"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/43700","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/43700"},{"reference_url":"http://www.ubuntu.com/usn/USN-1013-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1013-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=623625","reference_id":"623625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=623625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3311","reference_id":"CVE-2010-3311","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3311"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/1013-1/","reference_id":"USN-1013-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1013-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-3311"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7698-fwj1-fufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35802?format=json","vulnerability_id":"VCID-79js-ywyp-x3au","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0226","reference_id":"","reference_type":"","scores":[{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93274","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93289","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93305","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93304","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93322","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10653","scoring_system":"epss","scoring_elements":"0.93333","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871","reference_id":"635871","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=722701","reference_id":"722701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=722701"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1085","reference_id":"RHSA-2011:1085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1085"},{"reference_url":"https://usn.ubuntu.com/1173-1/","reference_id":"USN-1173-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1173-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2011-0226"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79js-ywyp-x3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88870?format=json","vulnerability_id":"VCID-7jyc-psvy-hkgh","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2661","reference_id":"","reference_type":"","scores":[{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93955","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.9397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93994","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12644","scoring_system":"epss","scoring_elements":"0.93996","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618110","reference_id":"1618110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618110"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt","reference_id":"CVE-2006-2661;OSVDB-26033","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/27993.txt"},{"reference_url":"https://www.securityfocus.com/bid/18329/info","reference_id":"CVE-2006-2661;OSVDB-26033","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/18329/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0500","reference_id":"RHSA-2006:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0500"},{"reference_url":"https://usn.ubuntu.com/291-1/","reference_id":"USN-291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/291-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571387?format=json","purl":"pkg:deb/debian/freetype@2.2.1-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-2kj7-a6r9-bfft"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3wjn-8gnc-gkhr"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-5z69-3ht1-kfeh"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qn37-kjm4-tbap"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-rcck-xn4c-k3at"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-txkg-jsdf-93e6"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5"}],"aliases":["CVE-2006-2661"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jyc-psvy-hkgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=json","vulnerability_id":"VCID-a9r6-k8gp-nbfs","summary":"freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9383","reference_id":"","reference_type":"","scores":[{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.86003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.85961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02734","scoring_system":"epss","scoring_elements":"0.8598","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?46346","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?46346"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763613","reference_id":"1763613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763613"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9383","reference_id":"CVE-2015-9383","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9383"},{"reference_url":"https://usn.ubuntu.com/4126-1/","reference_id":"USN-4126-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-1/"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9383"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=json","vulnerability_id":"VCID-ahxa-yjxp-a7en","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2499","reference_id":"","reference_type":"","scores":[{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.8734","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87412","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03379","scoring_system":"epss","scoring_elements":"0.87418","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2499"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30248","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30248"},{"reference_url":"https://savannah.nongnu.org/bugs/?30249","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30249"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613162","reference_id":"613162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613162"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2499","reference_id":"CVE-2010-2499","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2499"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2499"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38542?format=json","vulnerability_id":"VCID-ask2-xeb7-7qbk","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9671","reference_id":"","reference_type":"","scores":[{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.86989","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87012","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87032","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.8704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87042","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87084","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03218","scoring_system":"epss","scoring_elements":"0.87085","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191094","reference_id":"1191094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191094"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9671"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ask2-xeb7-7qbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=json","vulnerability_id":"VCID-b35u-t7u2-sudy","summary":"security update","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9746","reference_id":"","reference_type":"","scores":[{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74807","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.7472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74761","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://savannah.nongnu.org/bugs/?41309","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?41309"},{"reference_url":"http://www.debian.org/security/2015/dsa-3370","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3370"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/11/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/11/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/25/4"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373","reference_id":"1262373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619","reference_id":"798619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9746","reference_id":"CVE-2014-9746","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9746"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9746"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35782?format=json","vulnerability_id":"VCID-bt31-xk8r-8qd2","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7d3d2cc4fef72c6be9c454b3809c387e12b44cfc"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2497.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2497","reference_id":"","reference_type":"","scores":[{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84083","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.83954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.83968","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.83983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.83987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84033","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84022","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84047","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84048","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.84074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02089","scoring_system":"epss","scoring_elements":"0.8408","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://savannah.nongnu.org/bugs/?30082","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30082"},{"reference_url":"https://savannah.nongnu.org/bugs/?30083","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30083"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613154","reference_id":"613154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613154"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2497","reference_id":"CVE-2010-2497","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2497"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2497"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bt31-xk8r-8qd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31559?format=json","vulnerability_id":"VCID-cvba-wjra-wye9","summary":"Multiple vulnerabilities in FreeType might result in the remote execution\n    of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1861","reference_id":"","reference_type":"","scores":[{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92343","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.9235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.9236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92384","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92393","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.92399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08522","scoring_system":"epss","scoring_elements":"0.924","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=484437","reference_id":"484437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=484437"},{"reference_url":"https://security.gentoo.org/glsa/200607-02","reference_id":"GLSA-200607-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200607-02"},{"reference_url":"https://security.gentoo.org/glsa/200710-09","reference_id":"GLSA-200710-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-09"},{"reference_url":"https://security.gentoo.org/glsa/201006-01","reference_id":"GLSA-201006-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0500","reference_id":"RHSA-2006:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0329","reference_id":"RHSA-2009:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1062","reference_id":"RHSA-2009:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1062"},{"reference_url":"https://usn.ubuntu.com/291-1/","reference_id":"USN-291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/291-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571387?format=json","purl":"pkg:deb/debian/freetype@2.2.1-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-2kj7-a6r9-bfft"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3wjn-8gnc-gkhr"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-5z69-3ht1-kfeh"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qn37-kjm4-tbap"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-rcck-xn4c-k3at"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-txkg-jsdf-93e6"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5"}],"aliases":["CVE-2006-1861"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cvba-wjra-wye9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=json","vulnerability_id":"VCID-cwfg-1d6f-hfgg","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128110167119337&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128110167119337&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808","reference_id":"","reference_type":"","scores":[{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91977","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91989","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30658","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30658"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907","reference_id":"621907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808","reference_id":"CVE-2010-2808","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2808"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=json","vulnerability_id":"VCID-d2v4-gm58-uyby","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1140","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1140"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800600","reference_id":"800600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140","reference_id":"CVE-2012-1140","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1140"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=json","vulnerability_id":"VCID-dcxj-zzfj-3bg7","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27406","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35901","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35467","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077985","reference_id":"2077985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077985"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5453-1/","reference_id":"USN-5453-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5453-1/"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"},{"reference_url":"https://usn.ubuntu.com/7352-2/","reference_id":"USN-7352-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27406"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=json","vulnerability_id":"VCID-edag-8pt8-jqdw","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1137","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800595","reference_id":"800595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137","reference_id":"CVE-2012-1137","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1137"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=json","vulnerability_id":"VCID-ettc-tamy-kfcf","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1133","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1133"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800591","reference_id":"800591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133","reference_id":"CVE-2012-1133","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1133"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=json","vulnerability_id":"VCID-ewj8-a9c8-w3dy","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1135","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1135"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800593","reference_id":"800593","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135","reference_id":"CVE-2012-1135","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1135"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46225?format=json","vulnerability_id":"VCID-f9ym-em5n-87ep","summary":"Multiple integer overflows in FreeType might allow for the remote execution\n    of arbitrary code or a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0946","reference_id":"","reference_type":"","scores":[{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94827","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94836","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.9484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94842","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.9486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.9488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16376","scoring_system":"epss","scoring_elements":"0.94881","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=491384","reference_id":"491384","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=491384"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925","reference_id":"524925","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925"},{"reference_url":"https://security.gentoo.org/glsa/200905-05","reference_id":"GLSA-200905-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200905-05"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0329","reference_id":"RHSA-2009:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1061","reference_id":"RHSA-2009:1061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1061"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1062","reference_id":"RHSA-2009:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1062"},{"reference_url":"https://usn.ubuntu.com/767-1/","reference_id":"USN-767-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/767-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2009-0946"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38536?format=json","vulnerability_id":"VCID-fp2p-5ymf-wffj","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9669","reference_id":"","reference_type":"","scores":[{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.8511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.8514","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85144","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85166","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85186","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85183","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85204","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02443","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191092","reference_id":"1191092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191092"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9669"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp2p-5ymf-wffj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=json","vulnerability_id":"VCID-gcht-dzky-fbay","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054","reference_id":"","reference_type":"","scores":[{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88298","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.securityfocus.com/bid/42621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42621"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632","reference_id":"625632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054","reference_id":"CVE-2010-3054","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-3054"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35803?format=json","vulnerability_id":"VCID-gcr7-xxtw-e3bs","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3256.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3256","reference_id":"","reference_type":"","scores":[{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.8533","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02511","scoring_system":"epss","scoring_elements":"0.85371","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03238","scoring_system":"epss","scoring_elements":"0.87114","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03238","scoring_system":"epss","scoring_elements":"0.87118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03238","scoring_system":"epss","scoring_elements":"0.87133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03238","scoring_system":"epss","scoring_elements":"0.87139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03238","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3256"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120","reference_id":"646120","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646120"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=746226","reference_id":"746226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=746226"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1402","reference_id":"RHSA-2011:1402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0094","reference_id":"RHSA-2012:0094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0094"},{"reference_url":"https://usn.ubuntu.com/1267-1/","reference_id":"USN-1267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1267-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2011-3256"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcr7-xxtw-e3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=json","vulnerability_id":"VCID-gmk4-9sks-s3a5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541","reference_id":"","reference_type":"","scores":[{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342","reference_id":"617342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541","reference_id":"CVE-2010-2541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2541"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38523?format=json","vulnerability_id":"VCID-gtka-sbgw-tuf5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9665","reference_id":"","reference_type":"","scores":[{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.8886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88896","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88921","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04321","scoring_system":"epss","scoring_elements":"0.88941","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191087","reference_id":"1191087","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191087"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9665"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gtka-sbgw-tuf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=json","vulnerability_id":"VCID-h7qy-dusf-tqb7","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1141","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1141"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800602","reference_id":"800602","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141","reference_id":"CVE-2012-1141","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1141"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=json","vulnerability_id":"VCID-hgkz-p83z-ybfe","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1127","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1127"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800583","reference_id":"800583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127","reference_id":"CVE-2012-1127","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1127"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=json","vulnerability_id":"VCID-hutw-rk7x-5bc3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9745","reference_id":"","reference_type":"","scores":[{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84887","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02361","scoring_system":"epss","scoring_elements":"0.84869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.8637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.864","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86406","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02908","scoring_system":"epss","scoring_elements":"0.86373","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262377","reference_id":"1262377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262377"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620","reference_id":"798620","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620"},{"reference_url":"https://usn.ubuntu.com/2739-1/","reference_id":"USN-2739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2739-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9745"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38539?format=json","vulnerability_id":"VCID-jg4p-nv1j-fyb9","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9670","reference_id":"","reference_type":"","scores":[{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89765","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.8977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.8978","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89796","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191093","reference_id":"1191093","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9670"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jg4p-nv1j-fyb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38501?format=json","vulnerability_id":"VCID-jn9w-2axj-8ke5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9659","reference_id":"","reference_type":"","scores":[{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86208","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.8628","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02866","scoring_system":"epss","scoring_elements":"0.86302","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191081","reference_id":"1191081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191081"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084","reference_id":"773084","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773084"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9659"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jn9w-2axj-8ke5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=json","vulnerability_id":"VCID-jwbe-5wmu-uqgp","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1131","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1131"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800589","reference_id":"800589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131","reference_id":"CVE-2012-1131","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1131"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88869?format=json","vulnerability_id":"VCID-kdfa-8q7m-2kbk","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0747","reference_id":"","reference_type":"","scores":[{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97606","published_at":"2026-04-01T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97639","published_at":"2026-04-24T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.9764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.45933","scoring_system":"epss","scoring_elements":"0.97644","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618019","reference_id":"1618019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618019"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt","reference_id":"CVE-2006-0747;OSVDB-26032","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/27992.txt"},{"reference_url":"https://www.securityfocus.com/bid/18326/info","reference_id":"CVE-2006-0747;OSVDB-26032","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/18326/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0500","reference_id":"RHSA-2006:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0500"},{"reference_url":"https://usn.ubuntu.com/291-1/","reference_id":"USN-291-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/291-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571387?format=json","purl":"pkg:deb/debian/freetype@2.2.1-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-2kj7-a6r9-bfft"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3wjn-8gnc-gkhr"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-5z69-3ht1-kfeh"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qn37-kjm4-tbap"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-rcck-xn4c-k3at"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-txkg-jsdf-93e6"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5"}],"aliases":["CVE-2006-0747"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdfa-8q7m-2kbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=json","vulnerability_id":"VCID-m8ha-zxb7-tyg6","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8105","reference_id":"","reference_type":"","scores":[{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81873","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81834","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81858","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.8176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81792","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01616","scoring_system":"epss","scoring_elements":"0.81811","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8105"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3839","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3839"},{"reference_url":"http://www.securityfocus.com/bid/99093","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99093"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446500","reference_id":"1446500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446500"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220","reference_id":"861220","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220"},{"reference_url":"https://security.archlinux.org/ASA-201705-10","reference_id":"ASA-201705-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-10"},{"reference_url":"https://security.archlinux.org/ASA-201705-7","reference_id":"ASA-201705-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-7"},{"reference_url":"https://security.archlinux.org/AVG-257","reference_id":"AVG-257","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-257"},{"reference_url":"https://security.archlinux.org/AVG-258","reference_id":"AVG-258","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-258"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8105","reference_id":"CVE-2017-8105","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8105"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3282-1/","reference_id":"USN-3282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-1/"},{"reference_url":"https://usn.ubuntu.com/3282-2/","reference_id":"USN-3282-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2017-8105"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=json","vulnerability_id":"VCID-mv93-73qb-ekgt","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1132","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1132"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800590","reference_id":"800590","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132","reference_id":"CVE-2012-1132","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1132"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=json","vulnerability_id":"VCID-n99m-fgj7-y3bk","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1138","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1138"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800597","reference_id":"800597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138","reference_id":"CVE-2012-1138","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1138"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38520?format=json","vulnerability_id":"VCID-nakp-vmxa-akey","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9664","reference_id":"","reference_type":"","scores":[{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78478","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.7851","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78516","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01153","scoring_system":"epss","scoring_elements":"0.78591","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191086","reference_id":"1191086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191086"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9664"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nakp-vmxa-akey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38533?format=json","vulnerability_id":"VCID-nfp7-sjcv-wkfv","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9668.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9668","reference_id":"","reference_type":"","scores":[{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82336","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.8235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82414","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82409","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82445","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82449","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01723","scoring_system":"epss","scoring_elements":"0.82484","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191091","reference_id":"1191091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191091"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9668"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfp7-sjcv-wkfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=json","vulnerability_id":"VCID-nn4w-gq71-kfgd","summary":"freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9290","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65927","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65999","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66018","published_at":"2026-04-24T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66029","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66028","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9290"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1741802","reference_id":"1741802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1741802"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9290"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=json","vulnerability_id":"VCID-nx21-ks3v-53e4","summary":"Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15999","reference_id":"","reference_type":"","scores":[{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99772","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92905","scoring_system":"epss","scoring_elements":"0.99775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92931","scoring_system":"epss","scoring_elements":"0.99774","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15999"},{"reference_url":"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html"},{"reference_url":"https://crbug.com/1139963","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://crbug.com/1139963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576"},{"reference_url":"http://seclists.org/fulldisclosure/2020/Nov/33","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"http://seclists.org/fulldisclosure/2020/Nov/33"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/cefsharp/CefSharp","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/cefsharp/CefSharp"},{"reference_url":"https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62"},{"reference_url":"https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15999","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15999"},{"reference_url":"https://security.gentoo.org/glsa/202011-12","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202011-12"},{"reference_url":"https://security.gentoo.org/glsa/202012-04","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202012-04"},{"reference_url":"https://security.gentoo.org/glsa/202401-19","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://security.gentoo.org/glsa/202401-19"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240812-0001","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20240812-0001"},{"reference_url":"https://www.debian.org/security/2021/dsa-4824","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://www.debian.org/security/2021/dsa-4824"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Common","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Common"},{"reference_url":"https://www.nuget.org/packages/CefSharp.WinForms","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.WinForms"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Wpf","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Wpf"},{"reference_url":"https://www.nuget.org/packages/CefSharp.Wpf.HwndHost","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.nuget.org/packages/CefSharp.Wpf.HwndHost"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890210","reference_id":"1890210","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890210"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586","reference_id":"972586","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586"},{"reference_url":"https://security.archlinux.org/ASA-202010-10","reference_id":"ASA-202010-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202010-10"},{"reference_url":"https://security.archlinux.org/ASA-202010-11","reference_id":"ASA-202010-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202010-11"},{"reference_url":"https://security.archlinux.org/ASA-202011-12","reference_id":"ASA-202011-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-12"},{"reference_url":"https://security.archlinux.org/AVG-1254","reference_id":"AVG-1254","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1254"},{"reference_url":"https://security.archlinux.org/AVG-1255","reference_id":"AVG-1255","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1255"},{"reference_url":"https://security.archlinux.org/AVG-1279","reference_id":"AVG-1279","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1279"},{"reference_url":"https://github.com/advisories/GHSA-pv36-h7jh-qm62","reference_id":"GHSA-pv36-h7jh-qm62","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-pv36-h7jh-qm62"},{"reference_url":"https://security.gentoo.org/glsa/202010-07","reference_id":"GLSA-202010-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202010-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/","reference_id":"J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-50","reference_id":"mfsa2020-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-51","reference_id":"mfsa2020-51","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-51"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-52","reference_id":"mfsa2020-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4351","reference_id":"RHSA-2020:4351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4907","reference_id":"RHSA-2020:4907","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4907"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4949","reference_id":"RHSA-2020:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4950","reference_id":"RHSA-2020:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4951","reference_id":"RHSA-2020:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4952","reference_id":"RHSA-2020:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4952"},{"reference_url":"https://usn.ubuntu.com/4593-1/","reference_id":"USN-4593-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4593-1/"},{"reference_url":"https://usn.ubuntu.com/4593-2/","reference_id":"USN-4593-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4593-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049018?format=json","purl":"pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2020-15999","GHSA-pv36-h7jh-qm62"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38506?format=json","vulnerability_id":"VCID-p2yw-ksc4-jfe9","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9660","reference_id":"","reference_type":"","scores":[{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.8955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89564","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04849","scoring_system":"epss","scoring_elements":"0.89569","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191082","reference_id":"1191082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191082"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9660"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2yw-ksc4-jfe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38527?format=json","vulnerability_id":"VCID-p8h9-9xku-hbhv","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9666","reference_id":"","reference_type":"","scores":[{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80537","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80614","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01421","scoring_system":"epss","scoring_elements":"0.80671","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191089","reference_id":"1191089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191089"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9666"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p8h9-9xku-hbhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38498?format=json","vulnerability_id":"VCID-pznp-81q7-z3d4","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9658","reference_id":"","reference_type":"","scores":[{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81172","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81273","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81309","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191080","reference_id":"1191080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191080"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9658"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pznp-81q7-z3d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=json","vulnerability_id":"VCID-pzsb-3h3d-t7hq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2498","reference_id":"","reference_type":"","scores":[{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.8571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85762","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85755","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02649","scoring_system":"epss","scoring_elements":"0.85804","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30106","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30106"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613160","reference_id":"613160","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613160"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2498","reference_id":"CVE-2010-2498","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2498"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2498"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44715?format=json","vulnerability_id":"VCID-qn37-kjm4-tbap","summary":"A vulnerability has been discovered in FreeType allowing for user-assisted\n    remote execution of arbitrary code.","references":[{"reference_url":"http://issues.foresightlinux.org/browse/FL-223","reference_id":"","reference_type":"","scores":[],"url":"http://issues.foresightlinux.org/browse/FL-223"},{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501"},{"reference_url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2007-0125.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2007-0125.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1351","reference_id":"","reference_type":"","scores":[{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07768","scoring_system":"epss","scoring_elements":"0.91974","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351"},{"reference_url":"http://secunia.com/advisories/24741","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24741"},{"reference_url":"http://secunia.com/advisories/24745","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24745"},{"reference_url":"http://secunia.com/advisories/24756","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24756"},{"reference_url":"http://secunia.com/advisories/24758","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24758"},{"reference_url":"http://secunia.com/advisories/24765","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24765"},{"reference_url":"http://secunia.com/advisories/24768","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24768"},{"reference_url":"http://secunia.com/advisories/24770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24770"},{"reference_url":"http://secunia.com/advisories/24771","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24771"},{"reference_url":"http://secunia.com/advisories/24772","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24772"},{"reference_url":"http://secunia.com/advisories/24776","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24776"},{"reference_url":"http://secunia.com/advisories/24791","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24791"},{"reference_url":"http://secunia.com/advisories/24885","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24885"},{"reference_url":"http://secunia.com/advisories/24889","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24889"},{"reference_url":"http://secunia.com/advisories/24921","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24921"},{"reference_url":"http://secunia.com/advisories/24996","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24996"},{"reference_url":"http://secunia.com/advisories/25004","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25004"},{"reference_url":"http://secunia.com/advisories/25006","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25006"},{"reference_url":"http://secunia.com/advisories/25096","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25096"},{"reference_url":"http://secunia.com/advisories/25195","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25195"},{"reference_url":"http://secunia.com/advisories/25216","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25216"},{"reference_url":"http://secunia.com/advisories/25305","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25305"},{"reference_url":"http://secunia.com/advisories/25495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25495"},{"reference_url":"http://secunia.com/advisories/28333","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28333"},{"reference_url":"http://secunia.com/advisories/30161","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30161"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-02.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200705-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200705-10.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33417","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33417"},{"reference_url":"https://issues.rpath.com/browse/RPL-1213","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1213"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=498954","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=498954"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1294","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1294"},{"reference_url":"http://www.debian.org/security/2008/dsa-1454","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1454"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:079","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:080","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:080"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:081","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:081"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_27_x.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_27_x.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_6_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_6_sr.html"},{"reference_url":"http://www.openbsd.org/errata39.html#021_xorg","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata39.html#021_xorg"},{"reference_url":"http://www.openbsd.org/errata40.html#011_xorg","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/errata40.html#011_xorg"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0126.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0126.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0132.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0132.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0150.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0150.html"},{"reference_url":"http://www.securityfocus.com/archive/1/464686/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464686/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/464816/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/464816/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23283","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23283"},{"reference_url":"http://www.securityfocus.com/bid/23300","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23300"},{"reference_url":"http://www.securityfocus.com/bid/23402","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23402"},{"reference_url":"http://www.securitytracker.com/id?1017857","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017857"},{"reference_url":"http://www.trustix.org/errata/2007/0013/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0013/"},{"reference_url":"http://www.ubuntu.com/usn/usn-448-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-448-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1217","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1217"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1264","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1264"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1548","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1548"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=235265","reference_id":"235265","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=235265"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771","reference_id":"426771","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=426771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1351","reference_id":"CVE-2007-1351","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1351"},{"reference_url":"https://security.gentoo.org/glsa/200705-02","reference_id":"GLSA-200705-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-02"},{"reference_url":"https://security.gentoo.org/glsa/200705-10","reference_id":"GLSA-200705-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0125","reference_id":"RHSA-2007:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0126","reference_id":"RHSA-2007:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0132","reference_id":"RHSA-2007:0132","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0132"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0150","reference_id":"RHSA-2007:0150","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0150"},{"reference_url":"https://usn.ubuntu.com/448-1/","reference_id":"USN-448-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/448-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2007-1351"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qn37-kjm4-tbap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36612?format=json","vulnerability_id":"VCID-qu13-pxwm-d3da","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7f2e4f4f553f6836be7683f66226afac3fa979b8"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5670","reference_id":"","reference_type":"","scores":[{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86482","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86526","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86523","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.8655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02977","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670"},{"reference_url":"http://secunia.com/advisories/51826","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51826"},{"reference_url":"http://secunia.com/advisories/51900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51900"},{"reference_url":"https://savannah.nongnu.org/bugs/?37907","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?37907"},{"reference_url":"http://www.freetype.org/","reference_id":"","reference_type":"","scores":[],"url":"http://www.freetype.org/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/25/2"},{"reference_url":"http://www.securitytracker.com/id?1027921","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027921"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"},{"reference_url":"http://www.ubuntu.com/usn/USN-1686-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1686-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691","reference_id":"696691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=890094","reference_id":"890094","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=890094"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5670","reference_id":"CVE-2012-5670","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5670"},{"reference_url":"https://security.gentoo.org/glsa/201402-16","reference_id":"GLSA-201402-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-16"},{"reference_url":"https://usn.ubuntu.com/1686-1/","reference_id":"USN-1686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1686-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-5670"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qu13-pxwm-d3da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34278?format=json","vulnerability_id":"VCID-rcck-xn4c-k3at","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1808","reference_id":"","reference_type":"","scores":[{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85565","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.8562","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.8566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0261","scoring_system":"epss","scoring_elements":"0.85693","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://secunia.com/advisories/35204","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35204"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020240","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020240"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0329.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29637","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29637"},{"reference_url":"http://www.securityfocus.com/bid/29639","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29639"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450774","reference_id":"450774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1808","reference_id":"CVE-2008-1808","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1808"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0329","reference_id":"RHSA-2009:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0329"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2008-1808"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=json","vulnerability_id":"VCID-s148-7tzs-gfg8","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27405","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25743","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25631","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077991","reference_id":"2077991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077991"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27405"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51301?format=json","vulnerability_id":"VCID-s3f6-paas-vye4","summary":"A buffer overflow was discovered in the PCF font parser, potentially\n    resulting in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3467","reference_id":"","reference_type":"","scores":[{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.9245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92475","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.9249","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920","reference_id":"379920","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=379920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353","reference_id":"383353","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=383353"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=487070","reference_id":"487070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=487070"},{"reference_url":"https://security.gentoo.org/glsa/200609-04","reference_id":"GLSA-200609-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0500","reference_id":"RHSA-2006:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0634","reference_id":"RHSA-2006:0634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0635","reference_id":"RHSA-2006:0635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0635"},{"reference_url":"https://usn.ubuntu.com/324-1/","reference_id":"USN-324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/324-1/"},{"reference_url":"https://usn.ubuntu.com/341-1/","reference_id":"USN-341-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/341-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571387?format=json","purl":"pkg:deb/debian/freetype@2.2.1-5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-2kj7-a6r9-bfft"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3wjn-8gnc-gkhr"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-5z69-3ht1-kfeh"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qn37-kjm4-tbap"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-rcck-xn4c-k3at"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-txkg-jsdf-93e6"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.2.1-5"}],"aliases":["CVE-2006-3467"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3f6-paas-vye4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36611?format=json","vulnerability_id":"VCID-s9u5-4nwv-vudq","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=07bdb6e289c7954e2a533039dc93c1c136099d2d"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0216.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0216.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5669.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5669","reference_id":"","reference_type":"","scores":[{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82142","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82226","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.8225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82272","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01687","scoring_system":"epss","scoring_elements":"0.82283","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669"},{"reference_url":"http://secunia.com/advisories/51826","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51826"},{"reference_url":"http://secunia.com/advisories/51900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51900"},{"reference_url":"https://savannah.nongnu.org/bugs/?37906","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?37906"},{"reference_url":"http://www.freetype.org/","reference_id":"","reference_type":"","scores":[],"url":"http://www.freetype.org/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/25/2"},{"reference_url":"http://www.securitytracker.com/id?1027921","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027921"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"},{"reference_url":"http://www.ubuntu.com/usn/USN-1686-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1686-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691","reference_id":"696691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=890088","reference_id":"890088","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=890088"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5669","reference_id":"CVE-2012-5669","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5669"},{"reference_url":"https://security.gentoo.org/glsa/201402-16","reference_id":"GLSA-201402-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0216","reference_id":"RHSA-2013:0216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0216"},{"reference_url":"https://usn.ubuntu.com/1686-1/","reference_id":"USN-1686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1686-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-5669"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9u5-4nwv-vudq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38530?format=json","vulnerability_id":"VCID-th47-m45d-m7dk","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9667.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9667","reference_id":"","reference_type":"","scores":[{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83802","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.8386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02029","scoring_system":"epss","scoring_elements":"0.83865","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191090","reference_id":"1191090","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191090"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9667"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-th47-m45d-m7dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86356?format=json","vulnerability_id":"VCID-tmb5-g2ua-ekek","summary":"freetype: OOB stack-based read/write in cf2_hintmap_build()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2241.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2241","reference_id":"","reference_type":"","scores":[{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.6992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69962","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.6997","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.69992","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.70042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.70051","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00618","scoring_system":"epss","scoring_elements":"0.7005","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646","reference_id":"1074646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1074646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299","reference_id":"741299","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741299"},{"reference_url":"https://usn.ubuntu.com/2148-1/","reference_id":"USN-2148-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2148-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-2241"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmb5-g2ua-ekek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=json","vulnerability_id":"VCID-tsw4-kqbc-kqf1","summary":"freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72294","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45955","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45955"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788","reference_id":"1752788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381","reference_id":"CVE-2015-9381","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9381"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38548?format=json","vulnerability_id":"VCID-tu7r-tsp8-73ew","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9673","reference_id":"","reference_type":"","scores":[{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88707","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88717","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88734","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88751","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88774","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88787","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88793","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191096","reference_id":"1191096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191096"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9673"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tu7r-tsp8-73ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34276?format=json","vulnerability_id":"VCID-txkg-jsdf-93e6","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716","reference_id":"","reference_type":"","scores":[],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1807","reference_id":"","reference_type":"","scores":[{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90016","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90062","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.9006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90055","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90071","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05336","scoring_system":"epss","scoring_elements":"0.90087","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807"},{"reference_url":"http://secunia.com/advisories/30600","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30600"},{"reference_url":"http://secunia.com/advisories/30721","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30721"},{"reference_url":"http://secunia.com/advisories/30740","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30740"},{"reference_url":"http://secunia.com/advisories/30766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30766"},{"reference_url":"http://secunia.com/advisories/30819","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30819"},{"reference_url":"http://secunia.com/advisories/30821","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30821"},{"reference_url":"http://secunia.com/advisories/30967","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30967"},{"reference_url":"http://secunia.com/advisories/31479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31479"},{"reference_url":"http://secunia.com/advisories/31577","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31577"},{"reference_url":"http://secunia.com/advisories/31707","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31707"},{"reference_url":"http://secunia.com/advisories/31709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31709"},{"reference_url":"http://secunia.com/advisories/31711","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31711"},{"reference_url":"http://secunia.com/advisories/31712","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31712"},{"reference_url":"http://secunia.com/advisories/31823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31823"},{"reference_url":"http://secunia.com/advisories/31856","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31856"},{"reference_url":"http://secunia.com/advisories/31900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31900"},{"reference_url":"http://secunia.com/advisories/33937","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33937"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200806-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200806-10.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201209-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201209-25.xml"},{"reference_url":"http://securitytracker.com/id?1020239","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1020239"},{"reference_url":"https://issues.rpath.com/browse/RPL-2608","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-2608"},{"reference_url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"},{"reference_url":"http://support.apple.com/kb/HT3026","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3026"},{"reference_url":"http://support.apple.com/kb/HT3129","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3129"},{"reference_url":"http://support.apple.com/kb/HT3438","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3438"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0556.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0558.html"},{"reference_url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495497/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/495869/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/29641","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/29641"},{"reference_url":"http://www.ubuntu.com/usn/usn-643-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-643-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2008-0014.html"},{"reference_url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player2/doc/releasenotes_player2.html"},{"reference_url":"http://www.vmware.com/support/player/doc/releasenotes_player.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/player/doc/releasenotes_player.html"},{"reference_url":"http://www.vmware.com/support/server/doc/releasenotes_server.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/server/doc/releasenotes_server.html"},{"reference_url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"},{"reference_url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1794","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1794"},{"reference_url":"http://www.vupen.com/english/advisories/2008/1876/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/1876/references"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2423","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2423"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2466","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2466"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2525","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2525"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2558","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=450773","reference_id":"450773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=450773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841","reference_id":"485841","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1807","reference_id":"CVE-2008-1807","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1807"},{"reference_url":"https://security.gentoo.org/glsa/200806-10","reference_id":"GLSA-200806-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200806-10"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0556","reference_id":"RHSA-2008:0556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0558","reference_id":"RHSA-2008:0558","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0558"},{"reference_url":"https://usn.ubuntu.com/643-1/","reference_id":"USN-643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/643-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571389?format=json","purl":"pkg:deb/debian/freetype@2.3.7-2%2Blenny8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-3vb1-m8xt-kfcf"},{"vulnerability":"VCID-3xz8-4wu5-fugq"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-48rk-qwp7-j7a8"},{"vulnerability":"VCID-4wp3-qsuc-1kh9"},{"vulnerability":"VCID-57th-r73p-a3fy"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-64dt-nnzb-mkfc"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-7698-fwj1-fufd"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ahxa-yjxp-a7en"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-bt31-xk8r-8qd2"},{"vulnerability":"VCID-cwfg-1d6f-hfgg"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-f9ym-em5n-87ep"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcht-dzky-fbay"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gmk4-9sks-s3a5"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-pzsb-3h3d-t7hq"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-tyhk-9jvd-y7bj"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-vykx-mb8e-hyfv"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wbve-vpw4-tqhe"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-yq1k-j2t6-e7g5"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zn5p-qvxr-fqhx"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.3.7-2%252Blenny8"}],"aliases":["CVE-2008-1807"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35789?format=json","vulnerability_id":"VCID-tyhk-9jvd-y7bj","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=888cd1843e935fe675cf2ac303116d4ed5b9d54b"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2520","reference_id":"","reference_type":"","scores":[{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86951","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86918","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86924","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86947","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://savannah.nongnu.org/bugs/?30361","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30361"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613198","reference_id":"613198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613198"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2520","reference_id":"CVE-2010-2520","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2520"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2520"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tyhk-9jvd-y7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38545?format=json","vulnerability_id":"VCID-u15r-u7zz-17ad","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9672","reference_id":"","reference_type":"","scores":[{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89327","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89341","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.8938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89376","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.89398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04704","scoring_system":"epss","scoring_elements":"0.894","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191095","reference_id":"1191095","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191095"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9672"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u15r-u7zz-17ad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38510?format=json","vulnerability_id":"VCID-uh3u-pzzg-fkgg","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9661","reference_id":"","reference_type":"","scores":[{"value":"0.03613","scoring_system":"epss","scoring_elements":"0.87822","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89613","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.8961","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89648","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89677","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04948","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191083","reference_id":"1191083","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191083"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0696","reference_id":"RHSA-2015:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0696"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9661"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh3u-pzzg-fkgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38489?format=json","vulnerability_id":"VCID-uhnk-v91u-p7e5","summary":"Multiple vulnerabilities have been found in FreeType, possibly\n    resulting in Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9656","reference_id":"","reference_type":"","scores":[{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85232","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.8527","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02464","scoring_system":"epss","scoring_elements":"0.85301","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191078","reference_id":"1191078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191078"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656","reference_id":"777656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777656"},{"reference_url":"https://security.gentoo.org/glsa/201503-05","reference_id":"GLSA-201503-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-05"},{"reference_url":"https://usn.ubuntu.com/2510-1/","reference_id":"USN-2510-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2510-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035560?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3"}],"aliases":["CVE-2014-9656"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhnk-v91u-p7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=json","vulnerability_id":"VCID-uy24-k7je-pyhr","summary":"A vulnerability has been discovered in FreeType, which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27363","reference_id":"","reference_type":"","scores":[{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98416","published_at":"2026-04-16T12:55:00Z"},{"value":"0.63439","scoring_system":"epss","scoring_elements":"0.98415","published_at":"2026-04-18T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98462","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64976","scoring_system":"epss","scoring_elements":"0.98468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.68721","scoring_system":"epss","scoring_elements":"0.98627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.69158","scoring_system":"epss","scoring_elements":"0.9865","published_at":"2026-04-24T12:55:00Z"},{"value":"0.69158","scoring_system":"epss","scoring_elements":"0.98651","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-27363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351357","reference_id":"2351357","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2351357"},{"reference_url":"https://security.archlinux.org/ASA-202505-11","reference_id":"ASA-202505-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-11"},{"reference_url":"https://security.archlinux.org/AVG-2877","reference_id":"AVG-2877","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2877"},{"reference_url":"https://www.facebook.com/security/advisories/cve-2025-27363","reference_id":"cve-2025-27363","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/"}],"url":"https://www.facebook.com/security/advisories/cve-2025-27363"},{"reference_url":"https://security.gentoo.org/glsa/202505-07","reference_id":"GLSA-202505-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3382","reference_id":"RHSA-2025:3382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3383","reference_id":"RHSA-2025:3383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3384","reference_id":"RHSA-2025:3384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3385","reference_id":"RHSA-2025:3385","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3385"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3386","reference_id":"RHSA-2025:3386","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3386"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3387","reference_id":"RHSA-2025:3387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3393","reference_id":"RHSA-2025:3393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3395","reference_id":"RHSA-2025:3395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3407","reference_id":"RHSA-2025:3407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3421","reference_id":"RHSA-2025:3421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8195","reference_id":"RHSA-2025:8195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8219","reference_id":"RHSA-2025:8219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8253","reference_id":"RHSA-2025:8253","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8253"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8292","reference_id":"RHSA-2025:8292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9380","reference_id":"RHSA-2025:9380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9380"},{"reference_url":"https://usn.ubuntu.com/7352-1/","reference_id":"USN-7352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-1/"},{"reference_url":"https://usn.ubuntu.com/7352-2/","reference_id":"USN-7352-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7352-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1056064?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4"}],"aliases":["CVE-2025-27363"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35804?format=json","vulnerability_id":"VCID-v6um-wgpt-myax","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3439.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3439","reference_id":"","reference_type":"","scores":[{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91098","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91111","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91162","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06537","scoring_system":"epss","scoring_elements":"0.91158","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122","reference_id":"649122","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649122"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=753799","reference_id":"753799","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=753799"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1455","reference_id":"RHSA-2011:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0094","reference_id":"RHSA-2012:0094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0094"},{"reference_url":"https://usn.ubuntu.com/1267-1/","reference_id":"USN-1267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1267-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2011-3439"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6um-wgpt-myax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35781?format=json","vulnerability_id":"VCID-vykx-mb8e-hyfv","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html"},{"reference_url":"http://osvdb.org/66828","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/66828"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1797","reference_id":"","reference_type":"","scores":[{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98268","published_at":"2026-04-29T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98242","published_at":"2026-04-01T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98267","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1797"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797"},{"reference_url":"http://secunia.com/advisories/40807","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40807"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://support.apple.com/kb/HT4291","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4291"},{"reference_url":"http://support.apple.com/kb/HT4292","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4292"},{"reference_url":"http://www.exploit-db.com/exploits/14538","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/14538"},{"reference_url":"http://www.f-secure.com/weblog/archives/00002002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.f-secure.com/weblog/archives/00002002.html"},{"reference_url":"http://www.securityfocus.com/bid/42151","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42151"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621144","reference_id":"621144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621144"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1797","reference_id":"CVE-2010-1797","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1797"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py","reference_id":"CVE-2010-1797;OSVDB-66828","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt","reference_id":"CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0607","reference_id":"RHSA-2010:0607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0607"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-1797"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=json","vulnerability_id":"VCID-wapu-grak-1bca","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1134","reference_id":"","reference_type":"","scores":[{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1134"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800592","reference_id":"800592","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134","reference_id":"CVE-2012-1134","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1134"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=json","vulnerability_id":"VCID-wbve-vpw4-tqhe","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127905701201340&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127905701201340&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127909326909362&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127909326909362&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2519","reference_id":"","reference_type":"","scores":[{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89105","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89114","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.8916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.8917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0452","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"https://savannah.nongnu.org/bugs/?30306","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30306"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.debian.org/security/2010/dsa-2070","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2070"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:137"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-963-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-963-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=613194","reference_id":"613194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=613194"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2519","reference_id":"CVE-2010-2519","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2519"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/963-1/","reference_id":"USN-963-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/963-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2519"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=json","vulnerability_id":"VCID-wr9p-x4sm-aqdh","summary":"Multiple vulnerabilities have been found in FreeType, the worst of\n    which allows remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8287","reference_id":"","reference_type":"","scores":[{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73984","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74002","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8287"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-3839","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3839"},{"reference_url":"http://www.securityfocus.com/bid/99091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/99091"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446073","reference_id":"1446073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1446073"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308","reference_id":"861308","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308"},{"reference_url":"https://security.archlinux.org/ASA-201705-10","reference_id":"ASA-201705-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-10"},{"reference_url":"https://security.archlinux.org/ASA-201705-7","reference_id":"ASA-201705-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-7"},{"reference_url":"https://security.archlinux.org/AVG-257","reference_id":"AVG-257","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-257"},{"reference_url":"https://security.archlinux.org/AVG-258","reference_id":"AVG-258","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-258"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8287","reference_id":"CVE-2017-8287","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8287"},{"reference_url":"https://security.gentoo.org/glsa/201706-14","reference_id":"GLSA-201706-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-14"},{"reference_url":"https://usn.ubuntu.com/3282-1/","reference_id":"USN-3282-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-1/"},{"reference_url":"https://usn.ubuntu.com/3282-2/","reference_id":"USN-3282-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3282-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2017-8287"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=json","vulnerability_id":"VCID-xb9q-dk8j-fbch","summary":"Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27404","reference_id":"","reference_type":"","scores":[{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31519","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31218","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31138","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183","reference_id":"1010183","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077989","reference_id":"2077989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077989"},{"reference_url":"https://security.gentoo.org/glsa/202402-06","reference_id":"GLSA-202402-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7745","reference_id":"RHSA-2022:7745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8340","reference_id":"RHSA-2022:8340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8340"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0420","reference_id":"RHSA-2024:0420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0420"},{"reference_url":"https://usn.ubuntu.com/5528-1/","reference_id":"USN-5528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051184?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"},{"vulnerability":"VCID-uy24-k7je-pyhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1"}],"aliases":["CVE-2022-27404"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=json","vulnerability_id":"VCID-xe45-fv7j-4ucr","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1126","reference_id":"","reference_type":"","scores":[{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1126"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800581","reference_id":"800581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126","reference_id":"CVE-2012-1126","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1126"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36610?format=json","vulnerability_id":"VCID-xyay-hhmw-cyb1","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    context-dependent attackers to possibly execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9b6b5754b57c12b820e01305eb69b8863a161e5a"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5668.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5668","reference_id":"","reference_type":"","scores":[{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86142","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.8616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02815","scoring_system":"epss","scoring_elements":"0.86178","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668"},{"reference_url":"http://secunia.com/advisories/51826","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51826"},{"reference_url":"http://secunia.com/advisories/51900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51900"},{"reference_url":"https://savannah.nongnu.org/bugs/?37905","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?37905"},{"reference_url":"http://www.freetype.org/","reference_id":"","reference_type":"","scores":[],"url":"http://www.freetype.org/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/25/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/25/2"},{"reference_url":"http://www.securitytracker.com/id?1027921","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027921"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.520186"},{"reference_url":"http://www.ubuntu.com/usn/USN-1686-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1686-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691","reference_id":"696691","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696691"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=890087","reference_id":"890087","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=890087"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5668","reference_id":"CVE-2012-5668","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5668"},{"reference_url":"https://security.gentoo.org/glsa/201402-16","reference_id":"GLSA-201402-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-16"},{"reference_url":"https://usn.ubuntu.com/1686-1/","reference_id":"USN-1686-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1686-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-5668"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyay-hhmw-cyb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=json","vulnerability_id":"VCID-y4qf-qfbv-mqdg","summary":"freetype: NULL pointer dereference in the Ins_GETVARIATION() function","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6942","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41458","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41643","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49167","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544771","reference_id":"1544771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450","reference_id":"890450","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450"},{"reference_url":"https://security.archlinux.org/ASA-201805-3","reference_id":"ASA-201805-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-3"},{"reference_url":"https://security.archlinux.org/AVG-613","reference_id":"AVG-613","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-613"},{"reference_url":"https://usn.ubuntu.com/3572-1/","reference_id":"USN-3572-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3572-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049018?format=json","purl":"pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3"}],"aliases":["CVE-2018-6942"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35797?format=json","vulnerability_id":"VCID-yq1k-j2t6-e7g5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3053","reference_id":"","reference_type":"","scores":[{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.8233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82352","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82363","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3053"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625630","reference_id":"625630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625630"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3053","reference_id":"CVE-2010-3053","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3053"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-3053"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=json","vulnerability_id":"VCID-ysfs-xxjz-vbep","summary":"freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382","reference_id":"","reference_type":"","scores":[{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45922","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45922"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609","reference_id":"1763609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382","reference_id":"CVE-2015-9382","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2015-9382"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35792?format=json","vulnerability_id":"VCID-zn5p-qvxr-fqhx","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2805","reference_id":"","reference_type":"","scores":[{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90305","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2805"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://savannah.nongnu.org/bugs/?30644","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30644"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625626","reference_id":"625626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625626"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2805","reference_id":"CVE-2010-2805","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2805"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571390?format=json","purl":"pkg:deb/debian/freetype@2.4.2-2.1%2Bsqueeze4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1teu-tz69-dff8"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-2fsn-uxp3-fbeg"},{"vulnerability":"VCID-38u1-6t8n-gqey"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-5rpx-8t3t-syhv"},{"vulnerability":"VCID-613j-8z2t-t3au"},{"vulnerability":"VCID-6pzj-1sgf-zbbr"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-6z8y-k8vw-nudd"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-79js-ywyp-x3au"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-d2v4-gm58-uyby"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-edag-8pt8-jqdw"},{"vulnerability":"VCID-ettc-tamy-kfcf"},{"vulnerability":"VCID-ewj8-a9c8-w3dy"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gcr7-xxtw-e3bs"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-h7qy-dusf-tqb7"},{"vulnerability":"VCID-hgkz-p83z-ybfe"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-jwbe-5wmu-uqgp"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-mv93-73qb-ekgt"},{"vulnerability":"VCID-n99m-fgj7-y3bk"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-qu13-pxwm-d3da"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-s9u5-4nwv-vudq"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-v6um-wgpt-myax"},{"vulnerability":"VCID-wapu-grak-1bca"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-xe45-fv7j-4ucr"},{"vulnerability":"VCID-xyay-hhmw-cyb1"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"},{"vulnerability":"VCID-zu7v-a14h-2ueu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-2.1%252Bsqueeze4"}],"aliases":["CVE-2010-2805"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=json","vulnerability_id":"VCID-zpnw-kwqf-63bp","summary":"security update","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9747","reference_id":"","reference_type":"","scores":[{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78109","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78016","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.7803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01099","scoring_system":"epss","scoring_elements":"0.78055","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://savannah.nongnu.org/bugs/?41309","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?41309"},{"reference_url":"http://www.debian.org/security/2015/dsa-3370","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3370"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/11/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/11/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/25/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/25/4"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373","reference_id":"1262373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262373"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619","reference_id":"798619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9747","reference_id":"CVE-2014-9747","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9747"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1035561?format=json","purl":"pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1049017?format=json","purl":"pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1"}],"aliases":["CVE-2014-9747"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=json","vulnerability_id":"VCID-zu7v-a14h-2ueu","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1136","reference_id":"","reference_type":"","scores":[{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1136"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800594","reference_id":"800594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136","reference_id":"CVE-2012-1136","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571392?format=json","purl":"pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-17au-pc1k-m7at"},{"vulnerability":"VCID-1ws8-ww77-ybah"},{"vulnerability":"VCID-3jn7-t1f6-uyfr"},{"vulnerability":"VCID-468g-dxsr-8yer"},{"vulnerability":"VCID-6xf8-49hw-hfaf"},{"vulnerability":"VCID-73d5-ezt5-87eh"},{"vulnerability":"VCID-73e1-scax-8ugj"},{"vulnerability":"VCID-a9r6-k8gp-nbfs"},{"vulnerability":"VCID-ask2-xeb7-7qbk"},{"vulnerability":"VCID-b35u-t7u2-sudy"},{"vulnerability":"VCID-dcxj-zzfj-3bg7"},{"vulnerability":"VCID-fp2p-5ymf-wffj"},{"vulnerability":"VCID-gtka-sbgw-tuf5"},{"vulnerability":"VCID-hutw-rk7x-5bc3"},{"vulnerability":"VCID-jg4p-nv1j-fyb9"},{"vulnerability":"VCID-jn9w-2axj-8ke5"},{"vulnerability":"VCID-m8ha-zxb7-tyg6"},{"vulnerability":"VCID-nakp-vmxa-akey"},{"vulnerability":"VCID-nfp7-sjcv-wkfv"},{"vulnerability":"VCID-nn4w-gq71-kfgd"},{"vulnerability":"VCID-nx21-ks3v-53e4"},{"vulnerability":"VCID-p2yw-ksc4-jfe9"},{"vulnerability":"VCID-p8h9-9xku-hbhv"},{"vulnerability":"VCID-pznp-81q7-z3d4"},{"vulnerability":"VCID-s148-7tzs-gfg8"},{"vulnerability":"VCID-th47-m45d-m7dk"},{"vulnerability":"VCID-tmb5-g2ua-ekek"},{"vulnerability":"VCID-tsw4-kqbc-kqf1"},{"vulnerability":"VCID-tu7r-tsp8-73ew"},{"vulnerability":"VCID-u15r-u7zz-17ad"},{"vulnerability":"VCID-uh3u-pzzg-fkgg"},{"vulnerability":"VCID-uhnk-v91u-p7e5"},{"vulnerability":"VCID-uy24-k7je-pyhr"},{"vulnerability":"VCID-wr9p-x4sm-aqdh"},{"vulnerability":"VCID-xb9q-dk8j-fbch"},{"vulnerability":"VCID-y4qf-qfbv-mqdg"},{"vulnerability":"VCID-ysfs-xxjz-vbep"},{"vulnerability":"VCID-zpnw-kwqf-63bp"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3"}],"aliases":["CVE-2012-1136"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@1.2-3"}