Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-3dy5-4e6w-3kgt
SummaryA non-existent chrome.manifest file will attempt to be loaded during startup from the primary installation directory. If a malicious user with local access puts chrome.manifest and other referenced files in this directory, they will be loaded and activated during startup. This could result in malicious software being added without consent or modification of referenced installed files.
Aliases
0
alias CVE-2017-5427
Fixed_packages
0
url pkg:alpm/archlinux/firefox@52.0-1
purl pkg:alpm/archlinux/firefox@52.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0-1
1
url pkg:deb/debian/firefox@52.0-1?distro=sid
purl pkg:deb/debian/firefox@52.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@51.0.1-1
purl pkg:alpm/archlinux/firefox@51.0.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-22xt-tnu1-gyhu
1
vulnerability VCID-3dy5-4e6w-3kgt
2
vulnerability VCID-3ehk-593t-abcp
3
vulnerability VCID-3nup-1513-ybaq
4
vulnerability VCID-3tww-nhmh-gua6
5
vulnerability VCID-667g-8khd-kkhm
6
vulnerability VCID-6b9m-3w58-qydd
7
vulnerability VCID-6m1t-sn26-fbaf
8
vulnerability VCID-6wce-w5a8-2qet
9
vulnerability VCID-6wy1-juan-8ua8
10
vulnerability VCID-dxr7-qubc-tyb7
11
vulnerability VCID-ecmf-7x8a-jugv
12
vulnerability VCID-erx8-1tfq-kyce
13
vulnerability VCID-gshc-3brh-c3dr
14
vulnerability VCID-jwze-7mfw-r3ax
15
vulnerability VCID-npyt-d8qr-wqdj
16
vulnerability VCID-qdc5-1z7p-zqar
17
vulnerability VCID-r8en-yg26-w3a1
18
vulnerability VCID-re3h-pcpx-puhe
19
vulnerability VCID-rff5-96dg-qqgp
20
vulnerability VCID-ssxw-2rbk-cyfe
21
vulnerability VCID-t4bj-qz9s-s7eb
22
vulnerability VCID-w67x-2qg8-v7gv
23
vulnerability VCID-w7g1-ub97-gqdd
24
vulnerability VCID-zpz5-xyxk-4fby
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@51.0.1-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5427
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27048
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27029
published_at 2026-04-09T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27032
published_at 2026-04-11T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26988
published_at 2026-04-12T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26931
published_at 2026-04-13T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26941
published_at 2026-04-16T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27088
published_at 2026-04-02T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27124
published_at 2026-04-04T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26915
published_at 2026-04-18T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26983
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5427
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1295542
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1295542
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.mozilla.org/security/advisories/mfsa2017-05/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-05/
4
reference_url http://www.securityfocus.com/bid/96692
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96692
5
reference_url http://www.securitytracker.com/id/1037966
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037966
6
reference_url https://security.archlinux.org/ASA-201703-3
reference_id ASA-201703-3
reference_type
scores
url https://security.archlinux.org/ASA-201703-3
7
reference_url https://security.archlinux.org/AVG-194
reference_id AVG-194
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-194
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5427
reference_id CVE-2017-5427
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5427
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-05
reference_id mfsa2017-05
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-05
11
reference_url https://usn.ubuntu.com/3216-1/
reference_id USN-3216-1
reference_type
scores
url https://usn.ubuntu.com/3216-1/
Weaknesses
0
cwe_id 362
name Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
description The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Exploits
Severity_range_score1.9 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-3dy5-4e6w-3kgt