Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-53y3-s5pc-nbh1
SummaryBy using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP).
Aliases
0
alias CVE-2018-12398
Fixed_packages
0
url pkg:alpm/archlinux/firefox@63.0-1
purl pkg:alpm/archlinux/firefox@63.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@63.0-1
1
url pkg:deb/debian/firefox@63.0-1?distro=sid
purl pkg:deb/debian/firefox@63.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@63.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@62.0.3-2
purl pkg:alpm/archlinux/firefox@62.0.3-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53y3-s5pc-nbh1
1
vulnerability VCID-7pu2-1t9x-5yf1
2
vulnerability VCID-8k1r-9djq-h3bh
3
vulnerability VCID-ctgf-rds5-4fda
4
vulnerability VCID-eyf6-1map-zbdz
5
vulnerability VCID-h8q1-8w25-2yfz
6
vulnerability VCID-m5f4-3a7z-y7aj
7
vulnerability VCID-pqak-1a9a-b3g1
8
vulnerability VCID-qq7q-7j4q-h7dz
9
vulnerability VCID-r7vv-451v-nbag
10
vulnerability VCID-t9c6-d2kv-2uhg
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@62.0.3-2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12398.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12398
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48528
published_at 2026-04-21T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48575
published_at 2026-04-16T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.4857
published_at 2026-04-18T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48511
published_at 2026-04-24T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48525
published_at 2026-04-13T12:55:00Z
5
value 0.00341
scoring_system epss
scoring_elements 0.56903
published_at 2026-04-11T12:55:00Z
6
value 0.00341
scoring_system epss
scoring_elements 0.56882
published_at 2026-04-12T12:55:00Z
7
value 0.00341
scoring_system epss
scoring_elements 0.5689
published_at 2026-04-08T12:55:00Z
8
value 0.00341
scoring_system epss
scoring_elements 0.56748
published_at 2026-04-01T12:55:00Z
9
value 0.00341
scoring_system epss
scoring_elements 0.56841
published_at 2026-04-02T12:55:00Z
10
value 0.00341
scoring_system epss
scoring_elements 0.56862
published_at 2026-04-04T12:55:00Z
11
value 0.00341
scoring_system epss
scoring_elements 0.56839
published_at 2026-04-07T12:55:00Z
12
value 0.00341
scoring_system epss
scoring_elements 0.56894
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12398
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1460538
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1488061
4
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
5
reference_url http://www.securityfocus.com/bid/105721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105721
6
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1693621
reference_id 1693621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1693621
8
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
9
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12398
reference_id CVE-2018-12398
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12398
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
17
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
2
cwe_id 284
name Improper Access Control
description The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Exploits
Severity_range_score4.3 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-53y3-s5pc-nbh1