Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-c11z-6f9c-3bb5
SummaryA mechanism to spoof the addressbar through the user interaction on the addressbar and the onblur event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar.
Aliases
0
alias CVE-2017-5451
Fixed_packages
0
url pkg:alpm/archlinux/firefox@53.0-1
purl pkg:alpm/archlinux/firefox@53.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@53.0-1
1
url pkg:deb/debian/firefox@52.0.1-1?distro=sid
purl pkg:deb/debian/firefox@52.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0.1-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@52.0.2-1
purl pkg:alpm/archlinux/firefox@52.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-3315-b7du-kydm
4
vulnerability VCID-3ega-m6fz-uugy
5
vulnerability VCID-4n3b-syg9-ykh9
6
vulnerability VCID-54vr-pby9-ffg7
7
vulnerability VCID-6a5y-dwev-93be
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-pp4w-2986-nqee
25
vulnerability VCID-q72b-g1hz-23fs
26
vulnerability VCID-q83t-h55y-eyhv
27
vulnerability VCID-ru7n-21qs-eyfx
28
vulnerability VCID-rwnr-ngz9-akg1
29
vulnerability VCID-x4gg-h5q9-ufbc
30
vulnerability VCID-y2dd-vp7y-5ka1
31
vulnerability VCID-yaew-dtry-pkfv
32
vulnerability VCID-z4hp-wpp1-17bu
33
vulnerability VCID-zr38-6kvs-ckdh
34
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0.2-1
1
url pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
purl pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-2t1r-58sq-3uaf
4
vulnerability VCID-3315-b7du-kydm
5
vulnerability VCID-3ega-m6fz-uugy
6
vulnerability VCID-4n3b-syg9-ykh9
7
vulnerability VCID-54vr-pby9-ffg7
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-pp4w-2986-nqee
24
vulnerability VCID-q72b-g1hz-23fs
25
vulnerability VCID-ru7n-21qs-eyfx
26
vulnerability VCID-tt4e-ufku-2yek
27
vulnerability VCID-wwx8-enxs-subd
28
vulnerability VCID-y2dd-vp7y-5ka1
29
vulnerability VCID-yaew-dtry-pkfv
30
vulnerability VCID-z4hp-wpp1-17bu
31
vulnerability VCID-zr38-6kvs-ckdh
32
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.1.0-2%3Farch=el7_3
2
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el7_3
3
url pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
purl pkg:rpm/redhat/thunderbird@52.1.0-1?arch=el6_9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-23bx-as83-e3bv
1
vulnerability VCID-2j7g-g6dj-qydb
2
vulnerability VCID-2t1r-58sq-3uaf
3
vulnerability VCID-3ega-m6fz-uugy
4
vulnerability VCID-4n3b-syg9-ykh9
5
vulnerability VCID-54vr-pby9-ffg7
6
vulnerability VCID-6sun-2gu6-jqh7
7
vulnerability VCID-77xw-dvy5-5uch
8
vulnerability VCID-79kw-syxy-n7a1
9
vulnerability VCID-8frm-8p43-pyh8
10
vulnerability VCID-8wgm-j522-4yac
11
vulnerability VCID-c11z-6f9c-3bb5
12
vulnerability VCID-dsuj-fmtr-cbft
13
vulnerability VCID-e43t-3b7n-c3bj
14
vulnerability VCID-f5dh-8kx7-vbfq
15
vulnerability VCID-f9dc-n2bd-gqdt
16
vulnerability VCID-h2zq-ubdu-sqc8
17
vulnerability VCID-hthe-t85x-13gz
18
vulnerability VCID-jzb7-dve8-jygb
19
vulnerability VCID-pp4w-2986-nqee
20
vulnerability VCID-q72b-g1hz-23fs
21
vulnerability VCID-ru7n-21qs-eyfx
22
vulnerability VCID-tt4e-ufku-2yek
23
vulnerability VCID-wwx8-enxs-subd
24
vulnerability VCID-y2dd-vp7y-5ka1
25
vulnerability VCID-yaew-dtry-pkfv
26
vulnerability VCID-z4hp-wpp1-17bu
27
vulnerability VCID-zr38-6kvs-ckdh
28
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@52.1.0-1%3Farch=el6_9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5451.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5451
reference_id
reference_type
scores
0
value 0.00551
scoring_system epss
scoring_elements 0.68032
published_at 2026-04-18T12:55:00Z
1
value 0.00551
scoring_system epss
scoring_elements 0.67942
published_at 2026-04-07T12:55:00Z
2
value 0.00551
scoring_system epss
scoring_elements 0.67993
published_at 2026-04-08T12:55:00Z
3
value 0.00551
scoring_system epss
scoring_elements 0.68007
published_at 2026-04-09T12:55:00Z
4
value 0.00551
scoring_system epss
scoring_elements 0.6803
published_at 2026-04-11T12:55:00Z
5
value 0.00551
scoring_system epss
scoring_elements 0.68016
published_at 2026-04-12T12:55:00Z
6
value 0.00551
scoring_system epss
scoring_elements 0.67982
published_at 2026-04-13T12:55:00Z
7
value 0.00551
scoring_system epss
scoring_elements 0.68019
published_at 2026-04-16T12:55:00Z
8
value 0.00551
scoring_system epss
scoring_elements 0.67922
published_at 2026-04-01T12:55:00Z
9
value 0.00551
scoring_system epss
scoring_elements 0.67944
published_at 2026-04-02T12:55:00Z
10
value 0.00551
scoring_system epss
scoring_elements 0.67963
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5451
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1273537
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1273537
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
6
reference_url https://www.mozilla.org/security/advisories/mfsa2017-13/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-13/
7
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
8
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443340
reference_id 1443340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443340
10
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
11
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5451
reference_id CVE-2017-5451
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-5451
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
reference_id mfsa2017-13
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-13
31
reference_url https://access.redhat.com/errata/RHSA-2017:1106
reference_id RHSA-2017:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1106
32
reference_url https://access.redhat.com/errata/RHSA-2017:1201
reference_id RHSA-2017:1201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1201
33
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
34
reference_url https://usn.ubuntu.com/3278-1/
reference_id USN-3278-1
reference_type
scores
url https://usn.ubuntu.com/3278-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.3 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-c11z-6f9c-3bb5