{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","type":"ebuild","namespace":"media-libs","name":"freetype","version":"2.4.9","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.4.11","latest_non_vulnerable_version":"2.13.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31427?format=json","vulnerability_id":"VCID-1teu-tz69-dff8","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1128","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8596","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85881","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8592","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85938","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1128"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800584","reference_id":"800584","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128","reference_id":"CVE-2012-1128","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1128"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1teu-tz69-dff8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31429?format=json","vulnerability_id":"VCID-2fsn-uxp3-fbeg","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1130","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1130"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800587","reference_id":"800587","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130","reference_id":"CVE-2012-1130","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1130"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsn-uxp3-fbeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31443?format=json","vulnerability_id":"VCID-38u1-6t8n-gqey","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1143","reference_id":"","reference_type":"","scores":[{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84224","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84236","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02148","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800606","reference_id":"800606","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143","reference_id":"CVE-2012-1143","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1143"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38u1-6t8n-gqey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31439?format=json","vulnerability_id":"VCID-5rpx-8t3t-syhv","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1139","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1139"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800598","reference_id":"800598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139","reference_id":"CVE-2012-1139","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1139"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5rpx-8t3t-syhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31428?format=json","vulnerability_id":"VCID-613j-8z2t-t3au","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1129","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1129"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800585","reference_id":"800585","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129","reference_id":"CVE-2012-1129","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1129"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-613j-8z2t-t3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31445?format=json","vulnerability_id":"VCID-6pzj-1sgf-zbbr","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1144","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1144"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800607","reference_id":"800607","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144","reference_id":"CVE-2012-1144","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1144"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6pzj-1sgf-zbbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31442?format=json","vulnerability_id":"VCID-6z8y-k8vw-nudd","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1142.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1142","reference_id":"","reference_type":"","scores":[{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89695","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1142"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800604","reference_id":"800604","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142","reference_id":"CVE-2012-1142","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1142"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6z8y-k8vw-nudd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31440?format=json","vulnerability_id":"VCID-d2v4-gm58-uyby","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1140","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1140"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800600","reference_id":"800600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140","reference_id":"CVE-2012-1140","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1140"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d2v4-gm58-uyby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31437?format=json","vulnerability_id":"VCID-edag-8pt8-jqdw","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1137","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86559","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800595","reference_id":"800595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137","reference_id":"CVE-2012-1137","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1137"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edag-8pt8-jqdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31432?format=json","vulnerability_id":"VCID-ettc-tamy-kfcf","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1133","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1133"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800591","reference_id":"800591","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133","reference_id":"CVE-2012-1133","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1133"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ettc-tamy-kfcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31434?format=json","vulnerability_id":"VCID-ewj8-a9c8-w3dy","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1135","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1135"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800593","reference_id":"800593","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135","reference_id":"CVE-2012-1135","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1135"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ewj8-a9c8-w3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31441?format=json","vulnerability_id":"VCID-h7qy-dusf-tqb7","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1141","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1141"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800602","reference_id":"800602","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141","reference_id":"CVE-2012-1141","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1141"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h7qy-dusf-tqb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31426?format=json","vulnerability_id":"VCID-hgkz-p83z-ybfe","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1127","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1127"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800583","reference_id":"800583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127","reference_id":"CVE-2012-1127","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1127"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkz-p83z-ybfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31430?format=json","vulnerability_id":"VCID-jwbe-5wmu-uqgp","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1131","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1131"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800589","reference_id":"800589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131","reference_id":"CVE-2012-1131","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1131"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwbe-5wmu-uqgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31431?format=json","vulnerability_id":"VCID-mv93-73qb-ekgt","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1132","reference_id":"","reference_type":"","scores":[{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86507","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86514","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86531","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.8654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02967","scoring_system":"epss","scoring_elements":"0.86558","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1132"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800590","reference_id":"800590","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132","reference_id":"CVE-2012-1132","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1132"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mv93-73qb-ekgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31438?format=json","vulnerability_id":"VCID-n99m-fgj7-y3bk","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1138","reference_id":"","reference_type":"","scores":[{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.8762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87688","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03525","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1138"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800597","reference_id":"800597","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138","reference_id":"CVE-2012-1138","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1138"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n99m-fgj7-y3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31433?format=json","vulnerability_id":"VCID-wapu-grak-1bca","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1134","reference_id":"","reference_type":"","scores":[{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90615","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05858","scoring_system":"epss","scoring_elements":"0.90597","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1134"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800592","reference_id":"800592","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134","reference_id":"CVE-2012-1134","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1134"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wapu-grak-1bca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31425?format=json","vulnerability_id":"VCID-xe45-fv7j-4ucr","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1126","reference_id":"","reference_type":"","scores":[{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86727","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03091","scoring_system":"epss","scoring_elements":"0.86854","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1126"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800581","reference_id":"800581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126","reference_id":"CVE-2012-1126","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1126"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xe45-fv7j-4ucr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31436?format=json","vulnerability_id":"VCID-zu7v-a14h-2ueu","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1136","reference_id":"","reference_type":"","scores":[{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89658","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04956","scoring_system":"epss","scoring_elements":"0.89695","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1136"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864","reference_id":"662864","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=662864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=800594","reference_id":"800594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=800594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136","reference_id":"CVE-2012-1136","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136"},{"reference_url":"https://security.gentoo.org/glsa/201204-04","reference_id":"GLSA-201204-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201204-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21","reference_id":"mfsa2012-21","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2012-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0467","reference_id":"RHSA-2012:0467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0467"},{"reference_url":"https://usn.ubuntu.com/1403-1/","reference_id":"USN-1403-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1403-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71872?format=json","purl":"pkg:ebuild/media-libs/freetype@2.4.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}],"aliases":["CVE-2012-1136"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zu7v-a14h-2ueu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/freetype@2.4.9"}