Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freetype vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2010-2808
Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.4.2 allows remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka...
Freetype Freetype
Apple Mac Os X
Apple Iphone Os
Apple Tvos
Canonical Ubuntu Linux 9.04
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 6.06
7.5
CVSSv2
CVE-2014-9665
The Load_SBit_Png function in sfnt/pngshim.c in FreeType prior to 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote malicious users to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other i...
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.10
Freetype Freetype
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
7.5
CVSSv2
CVE-2014-9668
The woff_open_font function in sfnt/sfobjs.c in FreeType prior to 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote malicious users to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have ...
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.10
Freetype Freetype
5.8
CVSSv2
CVE-2014-9672
Array index error in the parse_fond function in base/ftmac.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
Oracle Solaris 11.2
Oracle Solaris 10.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Freetype Freetype
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
7.5
CVSSv2
CVE-2014-9656
The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType prior to 2.5.4 does not properly check for an integer overflow, which allows remote malicious users to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenT...
Fedoraproject Fedora 20
Fedoraproject Fedora 21
Freetype Freetype
Debian Debian Linux 7.0
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
7.5
CVSSv2
CVE-2014-9662
cff/cf2ft.c in FreeType prior to 2.5.4 does not validate the return values of point-allocation functions, which allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Freetype Freetype
7.5
CVSSv2
CVE-2014-9659
cff/cf2intrp.c in the CFF CharString interpreter in FreeType prior to 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote malicious users to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted...
Oracle Solaris 10.0
Oracle Solaris 11.2
Freetype Freetype
Fedoraproject Fedora 21
Fedoraproject Fedora 20
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
7.5
CVSSv2
CVE-2009-0946
Multiple integer overflows in FreeType 2.3.9 and previous versions allow remote malicious users to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
Freetype Freetype
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Debian Debian Linux 6.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.04
Opensuse Opensuse 10.3
Opensuse Opensuse 11.0
Opensuse Opensuse 11.1
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 11
Apple Safari 4.0
Apple Iphone Os
Apple Mac Os X 10.4.11
Apple Mac Os X 10.5.8
Apple Mac Os X
Apple Mac Os X Server 10.4.11
Apple Mac Os X Server 10.5.8
Apple Mac Os X Server
6.8
CVSSv2
CVE-2014-9673
Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 15.04
Debian Debian Linux 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Freetype Freetype
4.3
CVSSv2
CVE-2014-9671
Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType prior to 2.5.4 allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incre...
Redhat Enterprise Linux Server Eus 7.1
Redhat Enterprise Linux Hpc Node Eus 7.1
Redhat Enterprise Linux Server Eus 6.6.z
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Hpc Node 7.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Hpc Node 6
Redhat Enterprise Linux Desktop 6.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 10.04
Oracle Solaris 10.0
Oracle Solaris 11.2
Opensuse Opensuse 13.2
Opensuse Opensuse 13.1
Freetype Freetype
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »