Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-qc2y-5tzg-ruav |
| Summary | JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
| 0 |
| url |
pkg:alpm/archlinux/firefox@56.0.2-1 |
| purl |
pkg:alpm/archlinux/firefox@56.0.2-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2xza-hhmr-5ybw |
|
| 1 |
| vulnerability |
VCID-4437-azu7-hyhb |
|
| 2 |
| vulnerability |
VCID-6a4w-c6p8-affn |
|
| 3 |
| vulnerability |
VCID-7xac-5zdj-9fgk |
|
| 4 |
| vulnerability |
VCID-bk86-keag-kfg8 |
|
| 5 |
| vulnerability |
VCID-dhyh-m8p3-ebdq |
|
| 6 |
| vulnerability |
VCID-e4pk-uyeh-xfgk |
|
| 7 |
| vulnerability |
VCID-ebzs-h9p8-tbb4 |
|
| 8 |
| vulnerability |
VCID-gkrs-1aat-efhf |
|
| 9 |
| vulnerability |
VCID-ka31-epgw-2kcq |
|
| 10 |
| vulnerability |
VCID-kg3p-hut6-47f6 |
|
| 11 |
| vulnerability |
VCID-qc2y-5tzg-ruav |
|
| 12 |
| vulnerability |
VCID-wwjw-cqjk-8qe2 |
|
| 13 |
| vulnerability |
VCID-xn3a-bun2-vkhy |
|
| 14 |
| vulnerability |
VCID-y92g-afff-2ua7 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@56.0.2-1 |
|
|
| References |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7840 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70375 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.7028 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70356 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70385 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.7031 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70348 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00633 |
| scoring_system |
epss |
| scoring_elements |
0.70371 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7840 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
79 |
| name |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
| description |
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
|
|
| Exploits |
|
| Severity_range_score | 4.3 - 10.0 |
| Exploitability | 0.5 |
| Weighted_severity | 9.0 |
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-qc2y-5tzg-ruav |