Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e43t-3b7n-c3bj
SummaryA mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system.
Aliases
0
alias CVE-2017-5454
Fixed_packages
0
url pkg:alpm/archlinux/firefox@53.0-1
purl pkg:alpm/archlinux/firefox@53.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@53.0-1
1
url pkg:deb/debian/firefox@52.0.1-1?distro=sid
purl pkg:deb/debian/firefox@52.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0.1-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@52.0.2-1
purl pkg:alpm/archlinux/firefox@52.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-3315-b7du-kydm
4
vulnerability VCID-3ega-m6fz-uugy
5
vulnerability VCID-4n3b-syg9-ykh9
6
vulnerability VCID-54vr-pby9-ffg7
7
vulnerability VCID-6a5y-dwev-93be
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-pp4w-2986-nqee
25
vulnerability VCID-q72b-g1hz-23fs
26
vulnerability VCID-q83t-h55y-eyhv
27
vulnerability VCID-ru7n-21qs-eyfx
28
vulnerability VCID-rwnr-ngz9-akg1
29
vulnerability VCID-x4gg-h5q9-ufbc
30
vulnerability VCID-y2dd-vp7y-5ka1
31
vulnerability VCID-yaew-dtry-pkfv
32
vulnerability VCID-z4hp-wpp1-17bu
33
vulnerability VCID-zr38-6kvs-ckdh
34
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0.2-1
1
url pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
purl pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-2t1r-58sq-3uaf
4
vulnerability VCID-3315-b7du-kydm
5
vulnerability VCID-3ega-m6fz-uugy
6
vulnerability VCID-4n3b-syg9-ykh9
7
vulnerability VCID-54vr-pby9-ffg7
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-pp4w-2986-nqee
24
vulnerability VCID-q72b-g1hz-23fs
25
vulnerability VCID-ru7n-21qs-eyfx
26
vulnerability VCID-tt4e-ufku-2yek
27
vulnerability VCID-wwx8-enxs-subd
28
vulnerability VCID-y2dd-vp7y-5ka1
29
vulnerability VCID-yaew-dtry-pkfv
30
vulnerability VCID-z4hp-wpp1-17bu
31
vulnerability VCID-zr38-6kvs-ckdh
32
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.1.0-2%3Farch=el7_3
2
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el6_9
3
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el7_3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5454.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5454
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67393
published_at 2026-04-16T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67343
published_at 2026-04-04T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67321
published_at 2026-04-07T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67372
published_at 2026-04-08T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.67385
published_at 2026-04-09T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67406
published_at 2026-04-11T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67394
published_at 2026-04-12T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67358
published_at 2026-04-13T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67283
published_at 2026-04-01T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.6732
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5454
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1349276
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1349276
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
6
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
7
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
8
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443338
reference_id 1443338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443338
10
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
11
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5454
reference_id CVE-2017-5454
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5454
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
31
reference_url https://access.redhat.com/errata/RHSA-2017:1106
reference_id RHSA-2017:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1106
32
reference_url https://access.redhat.com/errata/RHSA-2017:1201
reference_id RHSA-2017:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1201
33
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
34
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score3.5 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e43t-3b7n-c3bj