Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-7pu2-1t9x-5yf1
SummaryIf a site is loaded over a HTTPS connection but loads a favicon resource over HTTP, the mixed content warning is not displayed to users.
Aliases
0
alias CVE-2018-12403
Fixed_packages
0
url pkg:alpm/archlinux/firefox@63.0-1
purl pkg:alpm/archlinux/firefox@63.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@63.0-1
1
url pkg:deb/debian/firefox@63.0-1?distro=sid
purl pkg:deb/debian/firefox@63.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@63.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@62.0.3-2
purl pkg:alpm/archlinux/firefox@62.0.3-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53y3-s5pc-nbh1
1
vulnerability VCID-7pu2-1t9x-5yf1
2
vulnerability VCID-8k1r-9djq-h3bh
3
vulnerability VCID-ctgf-rds5-4fda
4
vulnerability VCID-eyf6-1map-zbdz
5
vulnerability VCID-h8q1-8w25-2yfz
6
vulnerability VCID-m5f4-3a7z-y7aj
7
vulnerability VCID-pqak-1a9a-b3g1
8
vulnerability VCID-qq7q-7j4q-h7dz
9
vulnerability VCID-r7vv-451v-nbag
10
vulnerability VCID-t9c6-d2kv-2uhg
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@62.0.3-2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12403.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12403
reference_id
reference_type
scores
0
value 0.00503
scoring_system epss
scoring_elements 0.66021
published_at 2026-04-01T12:55:00Z
1
value 0.00503
scoring_system epss
scoring_elements 0.66132
published_at 2026-04-21T12:55:00Z
2
value 0.00503
scoring_system epss
scoring_elements 0.66138
published_at 2026-04-11T12:55:00Z
3
value 0.00503
scoring_system epss
scoring_elements 0.66125
published_at 2026-04-12T12:55:00Z
4
value 0.00503
scoring_system epss
scoring_elements 0.66096
published_at 2026-04-13T12:55:00Z
5
value 0.00503
scoring_system epss
scoring_elements 0.66131
published_at 2026-04-16T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.66144
published_at 2026-04-18T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66063
published_at 2026-04-02T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66091
published_at 2026-04-04T12:55:00Z
9
value 0.00503
scoring_system epss
scoring_elements 0.66058
published_at 2026-04-07T12:55:00Z
10
value 0.00503
scoring_system epss
scoring_elements 0.66106
published_at 2026-04-08T12:55:00Z
11
value 0.00503
scoring_system epss
scoring_elements 0.66119
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12403
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1484753
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1484753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2018-26/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-26/
5
reference_url http://www.securityfocus.com/bid/105721
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105721
6
reference_url http://www.securitytracker.com/id/1041944
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041944
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1692373
reference_id 1692373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1692373
8
reference_url https://security.archlinux.org/ASA-201810-14
reference_id ASA-201810-14
reference_type
scores
url https://security.archlinux.org/ASA-201810-14
9
reference_url https://security.archlinux.org/AVG-787
reference_id AVG-787
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-787
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12403
reference_id CVE-2018-12403
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12403
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
reference_id mfsa2018-26
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-26
17
reference_url https://usn.ubuntu.com/3801-1/
reference_id USN-3801-1
reference_type
scores
url https://usn.ubuntu.com/3801-1/
Weaknesses
0
cwe_id 356
name Product UI does not Warn User of Unsafe Actions
description The product's user interface does not warn the user before undertaking an unsafe action on behalf of that user. This makes it easier for attackers to trick users into inflicting damage to their system.
1
cwe_id 290
name Authentication Bypass by Spoofing
description This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Exploits
Severity_range_score5.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-7pu2-1t9x-5yf1