Filter
-Infinity
0

FreeTypeInteger Overflow

EPSS
0.04%
First published (updated )

FreeTypeBuffer Overflow

7.8
First published (updated )

FedoraBuffer Overflow

First published (updated )

FedoraFreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation vi…

7.5
First published (updated )

FedoraFreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation vi…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FreeTypeHeap buffer overflow in Freetype

First published (updated )

UbuntuLast updated 24 July 2024

First published (updated )

redhat/freetypeLast updated 24 July 2024

First published (updated )

redhat/freetypeLast updated 24 July 2024

8.8
First published (updated )

FreeTypeIn FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Di…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/freetypeNull Pointer Dereference

First published (updated )

FreeTypeBuffer Overflow

First published (updated )

FreeTypeBuffer Overflow

First published (updated )

IBM Rational DOORS Next GenerationBuffer Overflow

First published (updated )

FreeTypeFreeType 2 before 2017-03-07 has an out-of-bounds write related to the TT_Get_MM_Var function in tru…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FreeTypeBuffer Overflow

First published (updated )

FreeTypeBuffer Overflow

First published (updated )

FreeTypeThe parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a fon…

7.8
First published (updated )

Debian GNU/LinuxThe t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly upda…

7.5
First published (updated )

Debian GNU/LinuxInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

UbuntuThe parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to ca…

First published (updated )

Ubuntubdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial su…

First published (updated )

UbuntuBuffer Overflow, Integer Overflow

7.5
First published (updated )

UbuntuBuffer Overflow

First published (updated )

UbuntuBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Ubuntu LinuxNull Pointer Dereference

First published (updated )

UbuntuInteger Overflow, Null Pointer Dereference

First published (updated )

UbuntuInteger Overflow

First published (updated )

UbuntuBuffer Overflow, Integer Overflow

First published (updated )

UbuntuBuffer Overflow, Integer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203