{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","type":"deb","namespace":"debian","name":"freetype","version":"2.4.2-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.4.2-2.1","latest_non_vulnerable_version":"2.14.3+dfsg-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35794?format=json","vulnerability_id":"VCID-48rk-qwp7-j7a8","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=346f1867fd32dae8f56e5b482d1af98f626804ac"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2807","reference_id":"","reference_type":"","scores":[{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89924","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.8993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89934","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.8995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89961","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05194","scoring_system":"epss","scoring_elements":"0.89977","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2807"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://savannah.nongnu.org/bugs/?30657","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30657"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625627","reference_id":"625627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625627"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2807","reference_id":"CVE-2010-2807","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2807"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2807"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48rk-qwp7-j7a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35793?format=json","vulnerability_id":"VCID-4wp3-qsuc-1kh9","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c06da1ad34663da7b6fc39b030dc3ae185b96557"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806","reference_id":"","reference_type":"","scores":[{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92833","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92754","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.9278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92781","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92795","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09383","scoring_system":"epss","scoring_elements":"0.92821","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2806"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30656","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30656"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980","reference_id":"621980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806","reference_id":"CVE-2010-2806","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2806"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2806"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4wp3-qsuc-1kh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35795?format=json","vulnerability_id":"VCID-cwfg-1d6f-hfgg","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=81f3472c0ba7b8f6466e2e214fa8c1c17fade975"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128110167119337&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128110167119337&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808","reference_id":"","reference_type":"","scores":[{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92024","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91977","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91995","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.91992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07802","scoring_system":"epss","scoring_elements":"0.92015","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2808"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?30658","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30658"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907","reference_id":"621907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621907"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808","reference_id":"CVE-2010-2808","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2808"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2808"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwfg-1d6f-hfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35798?format=json","vulnerability_id":"VCID-gcht-dzky-fbay","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054","reference_id":"","reference_type":"","scores":[{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.8826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88298","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03893","scoring_system":"epss","scoring_elements":"0.88328","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3054"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.securityfocus.com/bid/42621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42621"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632","reference_id":"625632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054","reference_id":"CVE-2010-3054","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3054"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0736","reference_id":"RHSA-2010:0736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0737","reference_id":"RHSA-2010:0737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0737"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-3054"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gcht-dzky-fbay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=json","vulnerability_id":"VCID-gmk4-9sks-s3a5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541","reference_id":"","reference_type":"","scores":[{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04292","scoring_system":"epss","scoring_elements":"0.88818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.8933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89343","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89269","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04622","scoring_system":"epss","scoring_elements":"0.89299","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2541"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://securitytracker.com/id?1024266","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024266"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0577.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0578.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342","reference_id":"617342","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=617342"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541","reference_id":"CVE-2010-2541","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2541"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0577","reference_id":"RHSA-2010:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0577"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0578","reference_id":"RHSA-2010:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0578"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2541"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35781?format=json","vulnerability_id":"VCID-vykx-mb8e-hyfv","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=018f5c27813dd7eef4648fe254632ecea0c85a50"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=11d65e8a1f1f14e56148fd991965424d9bd1cdbc"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00001.html"},{"reference_url":"http://osvdb.org/66828","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/66828"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1797","reference_id":"","reference_type":"","scores":[{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98277","published_at":"2026-05-09T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98242","published_at":"2026-04-01T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98245","published_at":"2026-04-02T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98257","published_at":"2026-04-13T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98267","published_at":"2026-04-26T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98268","published_at":"2026-04-29T12:55:00Z"},{"value":"0.5972","scoring_system":"epss","scoring_elements":"0.98273","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1797"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797"},{"reference_url":"http://secunia.com/advisories/40807","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40807"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/60856"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"http://support.apple.com/kb/HT4291","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4291"},{"reference_url":"http://support.apple.com/kb/HT4292","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4292"},{"reference_url":"http://www.exploit-db.com/exploits/14538","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/14538"},{"reference_url":"http://www.f-secure.com/weblog/archives/00002002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.f-secure.com/weblog/archives/00002002.html"},{"reference_url":"http://www.securityfocus.com/bid/42151","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42151"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=621144","reference_id":"621144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=621144"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.3:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.4:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:1.1.5:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1797","reference_id":"CVE-2010-1797","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1797"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py","reference_id":"CVE-2010-1797;OSVDB-66828","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/14727.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt","reference_id":"CVE-2010-2973;CVE-2010-2972;OSVDB-67011;OSVDB-66828;OSVDB-66827;CVE-2010-1797","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/ios/local/14538.txt"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0607","reference_id":"RHSA-2010:0607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0607"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-1797"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vykx-mb8e-hyfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35797?format=json","vulnerability_id":"VCID-yq1k-j2t6-e7g5","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3053","reference_id":"","reference_type":"","scores":[{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82427","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.8233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82332","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82352","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01701","scoring_system":"epss","scoring_elements":"0.82406","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3053"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625630","reference_id":"625630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625630"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3053","reference_id":"CVE-2010-3053","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3053"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-3053"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq1k-j2t6-e7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35792?format=json","vulnerability_id":"VCID-zn5p-qvxr-fqhx","summary":"Multiple vulnerabilities have been found in FreeType, allowing\n    remote attackers to possibly execute arbitrary code or cause a Denial of\n    Service.","references":[{"reference_url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2","reference_id":"","reference_type":"","scores":[],"url":"http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2"},{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=45a3c76b547511fa9d97aca34b150a0663257375"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://marc.info/?l=oss-security&m=128111955616772&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=128111955616772&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2805","reference_id":"","reference_type":"","scores":[{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90413","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90305","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90324","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90354","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90385","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05634","scoring_system":"epss","scoring_elements":"0.90402","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2805"},{"reference_url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805"},{"reference_url":"http://secunia.com/advisories/40816","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40816"},{"reference_url":"http://secunia.com/advisories/40982","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40982"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"http://secunia.com/advisories/48951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48951"},{"reference_url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view"},{"reference_url":"https://savannah.nongnu.org/bugs/?30644","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?30644"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0864.html"},{"reference_url":"http://www.securityfocus.com/bid/42285","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/42285"},{"reference_url":"http://www.ubuntu.com/usn/USN-972-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-972-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2018","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2018"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2106","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2106"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625626","reference_id":"625626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625626"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2805","reference_id":"CVE-2010-2805","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2805"},{"reference_url":"https://security.gentoo.org/glsa/201201-09","reference_id":"GLSA-201201-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0864","reference_id":"RHSA-2010:0864","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0864"},{"reference_url":"https://usn.ubuntu.com/972-1/","reference_id":"USN-972-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/972-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/922656?format=json","purl":"pkg:deb/debian/freetype@2.4.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922647?format=json","purl":"pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hgm7-qrp2-c3g8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922645?format=json","purl":"pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922649?format=json","purl":"pkg:deb/debian/freetype@2.13.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.13.3%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/922648?format=json","purl":"pkg:deb/debian/freetype@2.14.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000437?format=json","purl":"pkg:deb/debian/freetype@2.14.3%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.14.3%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2010-2805"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn5p-qvxr-fqhx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.2-1%3Fdistro=trixie"}