Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1njr-8t2z-13ex
SummaryIf a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes.
Aliases
0
alias CVE-2018-5163
Fixed_packages
0
url pkg:alpm/archlinux/firefox@60.0-1
purl pkg:alpm/archlinux/firefox@60.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@60.0-1
1
url pkg:deb/debian/firefox@60.0-1?distro=sid
purl pkg:deb/debian/firefox@60.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@60.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@59.0.2-3
purl pkg:alpm/archlinux/firefox@59.0.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1njr-8t2z-13ex
1
vulnerability VCID-2mf4-kpr7-3kcu
2
vulnerability VCID-4trh-3k93-97br
3
vulnerability VCID-4znr-5fxr-qqhc
4
vulnerability VCID-7ksf-b6g3-ukcc
5
vulnerability VCID-8vn5-q4h7-ffa6
6
vulnerability VCID-95qq-zty2-2qa8
7
vulnerability VCID-d4bx-x9pb-8kfx
8
vulnerability VCID-ewqm-puf8-hkbv
9
vulnerability VCID-g7fw-yt1c-fqht
10
vulnerability VCID-geb6-buda-4fdb
11
vulnerability VCID-jtrv-jyme-sybh
12
vulnerability VCID-kufd-jgaq-jfd2
13
vulnerability VCID-mfwc-dm4n-vbey
14
vulnerability VCID-q3au-wru3-pbet
15
vulnerability VCID-qvj2-uwha-xff9
16
vulnerability VCID-rjjb-7ycx-cuaa
17
vulnerability VCID-rpj2-156g-aqcu
18
vulnerability VCID-tkmh-549z-4qhd
19
vulnerability VCID-v96d-equt-6bay
20
vulnerability VCID-w3wj-w2gp-kqh4
21
vulnerability VCID-w41h-2xyb-h3fj
22
vulnerability VCID-w44w-qwmk-mbbd
23
vulnerability VCID-zxn1-pdzk-sfdb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@59.0.2-3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5163.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5163
reference_id
reference_type
scores
0
value 0.0198
scoring_system epss
scoring_elements 0.83506
published_at 2026-04-01T12:55:00Z
1
value 0.0198
scoring_system epss
scoring_elements 0.83606
published_at 2026-04-21T12:55:00Z
2
value 0.0198
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-11T12:55:00Z
3
value 0.0198
scoring_system epss
scoring_elements 0.83575
published_at 2026-04-12T12:55:00Z
4
value 0.0198
scoring_system epss
scoring_elements 0.83571
published_at 2026-04-13T12:55:00Z
5
value 0.0198
scoring_system epss
scoring_elements 0.83605
published_at 2026-04-18T12:55:00Z
6
value 0.0198
scoring_system epss
scoring_elements 0.83518
published_at 2026-04-02T12:55:00Z
7
value 0.0198
scoring_system epss
scoring_elements 0.83532
published_at 2026-04-04T12:55:00Z
8
value 0.0198
scoring_system epss
scoring_elements 0.83533
published_at 2026-04-07T12:55:00Z
9
value 0.0198
scoring_system epss
scoring_elements 0.83557
published_at 2026-04-08T12:55:00Z
10
value 0.0198
scoring_system epss
scoring_elements 0.83566
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5163
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1426353
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1426353
3
reference_url https://www.mozilla.org/security/advisories/mfsa2018-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-11/
4
reference_url http://www.securityfocus.com/bid/104139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104139
5
reference_url http://www.securitytracker.com/id/1040896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040896
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576262
reference_id 1576262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576262
7
reference_url https://security.archlinux.org/ASA-201805-10
reference_id ASA-201805-10
reference_type
scores
url https://security.archlinux.org/ASA-201805-10
8
reference_url https://security.archlinux.org/AVG-693
reference_id AVG-693
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-693
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5163
reference_id CVE-2018-5163
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5163
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
reference_id mfsa2018-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
16
reference_url https://usn.ubuntu.com/3645-1/
reference_id USN-3645-1
reference_type
scores
url https://usn.ubuntu.com/3645-1/
Weaknesses
0
cwe_id 829
name Inclusion of Functionality from Untrusted Control Sphere
description The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
1
cwe_id 281
name Improper Preservation of Permissions
description The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
Exploits
Severity_range_score5.1 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1njr-8t2z-13ex