Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/libpng@2:1.2.48-1?arch=el6_2
Typerpm
Namespaceredhat
Namelibpng
Version2:1.2.48-1
Qualifiers
arch el6_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-wv1g-n5xx-7ycn
vulnerability_id VCID-wv1g-n5xx-7ycn
summary
Integer Overflow or Wraparound
Integer signedness error in the png_inflate function in pngrutil.c in libpng beta01, as used in Google Chrome and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3045.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3045
reference_id
reference_type
scores
0
value 0.04462
scoring_system epss
scoring_elements 0.89057
published_at 2026-04-07T12:55:00Z
1
value 0.04462
scoring_system epss
scoring_elements 0.89095
published_at 2026-04-21T12:55:00Z
2
value 0.04462
scoring_system epss
scoring_elements 0.89099
published_at 2026-04-18T12:55:00Z
3
value 0.04462
scoring_system epss
scoring_elements 0.89085
published_at 2026-04-13T12:55:00Z
4
value 0.04462
scoring_system epss
scoring_elements 0.89087
published_at 2026-04-12T12:55:00Z
5
value 0.04462
scoring_system epss
scoring_elements 0.89031
published_at 2026-04-01T12:55:00Z
6
value 0.04462
scoring_system epss
scoring_elements 0.89091
published_at 2026-04-11T12:55:00Z
7
value 0.04462
scoring_system epss
scoring_elements 0.89079
published_at 2026-04-09T12:55:00Z
8
value 0.04462
scoring_system epss
scoring_elements 0.8904
published_at 2026-04-02T12:55:00Z
9
value 0.04462
scoring_system epss
scoring_elements 0.89055
published_at 2026-04-04T12:55:00Z
10
value 0.04462
scoring_system epss
scoring_elements 0.89074
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3045
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html
reference_id 075424.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html
reference_id 075619.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html
reference_id 075981.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html
reference_id 075987.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html
reference_id 076461.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html
reference_id 076731.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html
8
reference_url http://secunia.com/advisories/48320
reference_id 48320
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://secunia.com/advisories/48320
9
reference_url http://secunia.com/advisories/48485
reference_id 48485
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://secunia.com/advisories/48485
10
reference_url http://secunia.com/advisories/48512
reference_id 48512
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://secunia.com/advisories/48512
11
reference_url http://secunia.com/advisories/48554
reference_id 48554
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://secunia.com/advisories/48554
12
reference_url http://secunia.com/advisories/49660
reference_id 49660
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://secunia.com/advisories/49660
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=799000
reference_id 799000
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=799000
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:033
reference_id advisories?name=MDVSA-2012:033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:033
15
reference_url http://src.chromium.org/viewvc/chrome?view=rev&revision=125311
reference_id chrome?view=rev&revision=125311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://src.chromium.org/viewvc/chrome?view=rev&revision=125311
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-3045
reference_id CVE-2011-3045
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2011-3045
17
reference_url http://code.google.com/p/chromium/issues/detail?id=116162
reference_id detail?id=116162
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://code.google.com/p/chromium/issues/detail?id=116162
18
reference_url http://www.debian.org/security/2012/dsa-2439
reference_id dsa-2439
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://www.debian.org/security/2012/dsa-2439
19
reference_url https://security.gentoo.org/glsa/201206-15
reference_id GLSA-201206-15
reference_type
scores
url https://security.gentoo.org/glsa/201206-15
20
reference_url http://security.gentoo.org/glsa/glsa-201206-15.xml
reference_id glsa-201206-15.xml
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://security.gentoo.org/glsa/glsa-201206-15.xml
21
reference_url http://www.securitytracker.com/id?1026823
reference_id id?1026823
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://www.securitytracker.com/id?1026823
22
reference_url http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b
reference_id libpng%3Ba=commit%3Bh=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commit%3Bh=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
24
reference_url http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html
reference_id msg00051.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html
25
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763
reference_id oval%3Aorg.mitre.oval%3Adef%3A14763
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763
26
reference_url https://access.redhat.com/errata/RHSA-2012:0407
reference_id RHSA-2012:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0407
27
reference_url http://rhn.redhat.com/errata/RHSA-2012-0407.html
reference_id RHSA-2012-0407.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://rhn.redhat.com/errata/RHSA-2012-0407.html
28
reference_url http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
reference_id stable-channel-update_21.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:35:38Z/
url http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
29
reference_url https://usn.ubuntu.com/1402-1/
reference_id USN-1402-1
reference_type
scores
url https://usn.ubuntu.com/1402-1/
fixed_packages
aliases CVE-2011-3045
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv1g-n5xx-7ycn
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libpng@2:1.2.48-1%3Farch=el6_2