Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2j7g-g6dj-qydb
SummaryIf a page is loaded from an original site through a hyperlink and contains a redirect to a data:text/html URL, triggering a reload will run the reloaded data:text/html page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack.
Aliases
0
alias CVE-2017-5466
Fixed_packages
0
url pkg:alpm/archlinux/firefox@53.0-1
purl pkg:alpm/archlinux/firefox@53.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@53.0-1
1
url pkg:deb/debian/firefox@52.0.1-1?distro=sid
purl pkg:deb/debian/firefox@52.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0.1-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@52.0.2-1
purl pkg:alpm/archlinux/firefox@52.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-3315-b7du-kydm
4
vulnerability VCID-3ega-m6fz-uugy
5
vulnerability VCID-4n3b-syg9-ykh9
6
vulnerability VCID-54vr-pby9-ffg7
7
vulnerability VCID-6a5y-dwev-93be
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-pp4w-2986-nqee
25
vulnerability VCID-q72b-g1hz-23fs
26
vulnerability VCID-q83t-h55y-eyhv
27
vulnerability VCID-ru7n-21qs-eyfx
28
vulnerability VCID-rwnr-ngz9-akg1
29
vulnerability VCID-x4gg-h5q9-ufbc
30
vulnerability VCID-y2dd-vp7y-5ka1
31
vulnerability VCID-yaew-dtry-pkfv
32
vulnerability VCID-z4hp-wpp1-17bu
33
vulnerability VCID-zr38-6kvs-ckdh
34
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0.2-1
1
url pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
purl pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-2t1r-58sq-3uaf
4
vulnerability VCID-3315-b7du-kydm
5
vulnerability VCID-3ega-m6fz-uugy
6
vulnerability VCID-4n3b-syg9-ykh9
7
vulnerability VCID-54vr-pby9-ffg7
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-pp4w-2986-nqee
24
vulnerability VCID-q72b-g1hz-23fs
25
vulnerability VCID-ru7n-21qs-eyfx
26
vulnerability VCID-tt4e-ufku-2yek
27
vulnerability VCID-wwx8-enxs-subd
28
vulnerability VCID-y2dd-vp7y-5ka1
29
vulnerability VCID-yaew-dtry-pkfv
30
vulnerability VCID-z4hp-wpp1-17bu
31
vulnerability VCID-zr38-6kvs-ckdh
32
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.1.0-2%3Farch=el7_3
2
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el6_9
3
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el7_3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5466.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5466
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70189
published_at 2026-04-16T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70109
published_at 2026-04-04T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70086
published_at 2026-04-07T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70134
published_at 2026-04-08T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.7015
published_at 2026-04-09T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.70173
published_at 2026-04-11T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.70158
published_at 2026-04-12T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.70146
published_at 2026-04-13T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70082
published_at 2026-04-01T12:55:00Z
9
value 0.00624
scoring_system epss
scoring_elements 0.70094
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5466
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
6
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
7
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
8
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443305
reference_id 1443305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443305
10
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
11
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5466
reference_id CVE-2017-5466
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5466
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
31
reference_url https://access.redhat.com/errata/RHSA-2017:1106
reference_id RHSA-2017:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1106
32
reference_url https://access.redhat.com/errata/RHSA-2017:1201
reference_id RHSA-2017:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1201
33
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
34
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
Weaknesses
0
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Exploits
Severity_range_score4.3 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2j7g-g6dj-qydb