{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T17:39:45.259","vulnerabilities":[{"cve":{"id":"CVE-2010-3054","sourceIdentifier":"cve@mitre.org","published":"2010-08-19T18:00:06.530","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c."},{"lang":"es","value":"Vulnerabilidad no especificada en FreeType 2.3.9 y otras versiones anteriores a la 2.4.2, permite a atacantes remotos provocar una denegación de servicio mediante vectores involucrados en llamadas anidadas Standard Encoding Accented Character (también conocido como seac), relacionadas con psaux.h, cffgload.c, cffgload.h y t1decode.c."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*","matchCriteriaId":"6FC0BD12-E065-4CC9-8AEE-E4C34A58EC3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*","matchCriteriaId":"214DC64B-BA35-486B-AE30-F2D9381E4D26"},{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*","matchCriteriaId":"B7CDE19A-473A-4BC5-AA7B-3D08FEEEE82C"},{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*","matchCriteriaId":"DD8401A8-A328-49F6-BAE8-337F5F36C906"},{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*","matchCriteriaId":"3FBF5BAA-8027-478F-BE06-3D3F4F823C7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:freetype:freetype:2.4.1:*:*:*:*:*:*:*","matchCriteriaId":"31358B5D-4087-4207-9730-297BA47DAA83"}]}]}],"references":[{"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","source":"cve@mitre.org"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/42314","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/42317","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/48951","source":"cve@mitre.org"},{"url":"http://support.apple.com/kb/HT4435","source":"cve@mitre.org"},{"url":"http://support.apple.com/kb/HT4456","source":"cve@mitre.org"},{"url":"http://support.apple.com/kb/HT4457","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/42621","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2010/3045","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2010/3046","source":"cve@mitre.org"},{"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","source":"cve@mitre.org"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","source":"cve@mitre.org"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","source":"cve@mitre.org"},{"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/42314","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/42317","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/48951","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT4435","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT4456","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.apple.com/kb/HT4457","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/42621","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/3045","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2010/3046","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0736.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://rhn.redhat.com/errata/RHSA-2010-0737.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}