Vulnerabilities (CVE)

Filtered by vendor Freetype Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-27406 2 Fedoraproject, Freetype 2 Fedora, Freetype 2022-07-27 5.0 MEDIUM 7.5 HIGH
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
CVE-2022-27405 2 Fedoraproject, Freetype 2 Fedora, Freetype 2022-07-27 5.0 MEDIUM 7.5 HIGH
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
CVE-2016-10244 2 Debian, Freetype 2 Debian Linux, Freetype 2021-01-26 6.8 MEDIUM 7.8 HIGH
The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
CVE-2015-9381 2 Debian, Freetype 2 Debian Linux, Freetype 2019-09-10 6.8 MEDIUM 8.8 HIGH
FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
CVE-2014-9747 2 Debian, Freetype 2 Debian Linux, Freetype 2016-06-08 5.0 MEDIUM 7.5 HIGH
The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.