Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-rff5-96dg-qqgp
SummaryOn Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox. *Note: this issue only affects Linux. Other operating systems are not affected.*
Aliases
0
alias CVE-2017-5426
Fixed_packages
0
url pkg:alpm/archlinux/firefox@52.0-1
purl pkg:alpm/archlinux/firefox@52.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0-1
1
url pkg:deb/debian/firefox@52.0-1?distro=sid
purl pkg:deb/debian/firefox@52.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@51.0.1-1
purl pkg:alpm/archlinux/firefox@51.0.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-22xt-tnu1-gyhu
1
vulnerability VCID-3dy5-4e6w-3kgt
2
vulnerability VCID-3ehk-593t-abcp
3
vulnerability VCID-3nup-1513-ybaq
4
vulnerability VCID-3tww-nhmh-gua6
5
vulnerability VCID-667g-8khd-kkhm
6
vulnerability VCID-6b9m-3w58-qydd
7
vulnerability VCID-6m1t-sn26-fbaf
8
vulnerability VCID-6wce-w5a8-2qet
9
vulnerability VCID-6wy1-juan-8ua8
10
vulnerability VCID-dxr7-qubc-tyb7
11
vulnerability VCID-ecmf-7x8a-jugv
12
vulnerability VCID-erx8-1tfq-kyce
13
vulnerability VCID-gshc-3brh-c3dr
14
vulnerability VCID-jwze-7mfw-r3ax
15
vulnerability VCID-npyt-d8qr-wqdj
16
vulnerability VCID-qdc5-1z7p-zqar
17
vulnerability VCID-r8en-yg26-w3a1
18
vulnerability VCID-re3h-pcpx-puhe
19
vulnerability VCID-rff5-96dg-qqgp
20
vulnerability VCID-ssxw-2rbk-cyfe
21
vulnerability VCID-t4bj-qz9s-s7eb
22
vulnerability VCID-w67x-2qg8-v7gv
23
vulnerability VCID-w7g1-ub97-gqdd
24
vulnerability VCID-zpz5-xyxk-4fby
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@51.0.1-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5426
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.53688
published_at 2026-04-21T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53648
published_at 2026-04-09T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53697
published_at 2026-04-11T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.53681
published_at 2026-04-12T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53664
published_at 2026-04-13T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.53701
published_at 2026-04-16T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53706
published_at 2026-04-18T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53578
published_at 2026-04-01T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53602
published_at 2026-04-02T12:55:00Z
9
value 0.00304
scoring_system epss
scoring_elements 0.5363
published_at 2026-04-04T12:55:00Z
10
value 0.00304
scoring_system epss
scoring_elements 0.53599
published_at 2026-04-07T12:55:00Z
11
value 0.00304
scoring_system epss
scoring_elements 0.5365
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5426
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1257361
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.mozilla.org/security/advisories/mfsa2017-05/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-05/
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-09/
5
reference_url http://www.securityfocus.com/bid/96694
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96694
6
reference_url http://www.securitytracker.com/id/1037966
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037966
7
reference_url https://security.archlinux.org/ASA-201703-3
reference_id ASA-201703-3
reference_type
scores
url https://security.archlinux.org/ASA-201703-3
8
reference_url https://security.archlinux.org/AVG-194
reference_id AVG-194
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-194
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5426
reference_id CVE-2017-5426
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5426
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-05
reference_id mfsa2017-05
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-05
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-09
reference_id mfsa2017-09
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-09
15
reference_url https://usn.ubuntu.com/3216-1/
reference_id USN-3216-1
reference_type
scores
url https://usn.ubuntu.com/3216-1/
Weaknesses
0
cwe_id 732
name Incorrect Permission Assignment for Critical Resource
description The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Exploits
Severity_range_score5.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-rff5-96dg-qqgp