Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2dtn-d1ua-3kc1
Summarywebkit: memory corruption with MIME types
Aliases
0
alias CVE-2010-3116
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/webkitgtk@1.2.6-2?arch=el6_0
purl pkg:rpm/redhat/webkitgtk@1.2.6-2?arch=el6_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h37-gwuw-87e9
1
vulnerability VCID-2dtn-d1ua-3kc1
2
vulnerability VCID-39x9-penz-pkgs
3
vulnerability VCID-3u7d-pbkn-hyb4
4
vulnerability VCID-3vpc-9a8c-mbfj
5
vulnerability VCID-5jb1-n71e-s7ad
6
vulnerability VCID-5xef-m53a-jub7
7
vulnerability VCID-6gfv-nmjh-cuf2
8
vulnerability VCID-7u1z-bjvm-5qd4
9
vulnerability VCID-83dt-nmrk-aydw
10
vulnerability VCID-84my-4hgz-rued
11
vulnerability VCID-a78t-69wq-fkd4
12
vulnerability VCID-byjr-c1xf-ffcs
13
vulnerability VCID-cxfg-bwxt-33gb
14
vulnerability VCID-d218-8puv-4kf4
15
vulnerability VCID-ecp1-x527-zqdq
16
vulnerability VCID-f92m-tada-93fa
17
vulnerability VCID-g5vd-mtmg-f3fj
18
vulnerability VCID-kjde-cvdr-z3cq
19
vulnerability VCID-kk37-95nx-9ufg
20
vulnerability VCID-km3y-gcdk-qyfx
21
vulnerability VCID-p58h-r5zy-yuad
22
vulnerability VCID-phuv-tkm2-rqdn
23
vulnerability VCID-q6u5-wbbz-tud8
24
vulnerability VCID-spgp-nk74-23ec
25
vulnerability VCID-t62m-ykm8-dugz
26
vulnerability VCID-tafm-ven6-57ez
27
vulnerability VCID-usp6-cu1e-zbde
28
vulnerability VCID-vkqd-stbm-hqdz
29
vulnerability VCID-xk9k-g9hc-m3au
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkitgtk@1.2.6-2%3Farch=el6_0
References
0
reference_url http://code.google.com/p/chromium/issues/detail?id=50515
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=50515
1
reference_url http://code.google.com/p/chromium/issues/detail?id=51835
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=51835
2
reference_url http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2010/08/stable-channel-update_19.html
3
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html
4
reference_url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3116.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3116.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3116
reference_id
reference_type
scores
0
value 0.10447
scoring_system epss
scoring_elements 0.93245
published_at 2026-04-16T12:55:00Z
1
value 0.10447
scoring_system epss
scoring_elements 0.93202
published_at 2026-04-01T12:55:00Z
2
value 0.10447
scoring_system epss
scoring_elements 0.93211
published_at 2026-04-02T12:55:00Z
3
value 0.10447
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-04T12:55:00Z
4
value 0.10447
scoring_system epss
scoring_elements 0.93212
published_at 2026-04-07T12:55:00Z
5
value 0.10447
scoring_system epss
scoring_elements 0.93221
published_at 2026-04-08T12:55:00Z
6
value 0.10447
scoring_system epss
scoring_elements 0.93225
published_at 2026-04-09T12:55:00Z
7
value 0.10447
scoring_system epss
scoring_elements 0.93229
published_at 2026-04-11T12:55:00Z
8
value 0.10447
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-12T12:55:00Z
9
value 0.10447
scoring_system epss
scoring_elements 0.93228
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3116
8
reference_url http://secunia.com/advisories/41856
reference_id
reference_type
scores
url http://secunia.com/advisories/41856
9
reference_url http://secunia.com/advisories/42314
reference_id
reference_type
scores
url http://secunia.com/advisories/42314
10
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
11
reference_url http://secunia.com/advisories/43086
reference_id
reference_type
scores
url http://secunia.com/advisories/43086
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11909
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11909
13
reference_url http://support.apple.com/kb/HT4455
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4455
14
reference_url http://support.apple.com/kb/HT4456
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4456
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
16
reference_url http://www.redhat.com/support/errata/RHSA-2011-0177.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0177.html
17
reference_url http://www.securityfocus.com/bid/44200
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/44200
18
reference_url http://www.ubuntu.com/usn/USN-1006-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1006-1
19
reference_url http://www.vupen.com/english/advisories/2010/2722
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2722
20
reference_url http://www.vupen.com/english/advisories/2010/3046
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3046
21
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
22
reference_url http://www.vupen.com/english/advisories/2011/0216
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0216
23
reference_url http://www.vupen.com/english/advisories/2011/0552
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0552
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=640353
reference_id 640353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=640353
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3116
reference_id CVE-2010-3116
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-3116
33
reference_url https://access.redhat.com/errata/RHSA-2011:0177
reference_id RHSA-2011:0177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0177
Weaknesses
0
cwe_id 416
name Use After Free
description Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Exploits
Severity_range_score10.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2dtn-d1ua-3kc1