[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-ALPINE-CVE-2022-27406":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-04T15:10:23.743Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":17,"related":18,"reserved_at":9,"published_at":19,"modified_at":20,"state":9,"summary":21,"references_raw":23,"kevs":30,"epss":9,"epss_history":31,"metrics":32,"affected":39},"ALPINE-CVE-2022-27406","FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.",null,[],[],[],[14],{"_key":15},"CVE-2022-27406",[],[],[],"2022-04-22T14:15:09.537Z","2025-12-03T22:50:13.906752Z",{"cisa_kev":22,"cisa_ransomware":22,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[24],{"url":25,"sources":26,"tags":28},"https://security.alpinelinux.org/vuln/CVE-2022-27406",[27],"osv_alpine",[29],"Advisory",[],[],[33],{"source":27,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":34,"cvss_v4_0":9},{"baseScore":35,"baseSeverity":9,"vectorString":36,"impactScore":37,"exploitabilityScore":38},7.5,"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",6,10,[40],{"ecosystem":41,"name":42,"vendor":43,"product":42,"cpe_part":9,"purl_type":44,"purl_namespace":43,"purl_name":42,"source":9,"versions":45},"Alpine Linux","freetype","alpine","apk",[46,52,55,56,59,62,63,64,65,66,67,68],{"version":47,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":50,"version_end_type":51,"fixed_in":9},"lt2_10_4_r2",true,"ecosystem","2.10.4-r2","excluding",{"version":53,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":54,"version_end_type":51,"fixed_in":9},"lt2_10_4_r3","2.10.4-r3",{"version":53,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":54,"version_end_type":51,"fixed_in":9},{"version":57,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":58,"version_end_type":51,"fixed_in":9},"lt2_11_1_r2","2.11.1-r2",{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},"lt2_12_1_r0","2.12.1-r0",{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9},{"version":60,"is_range":48,"range_type":49,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":51,"fixed_in":9}]