Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-q3au-wru3-pbet
SummaryThe filename appearing in the Downloads panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. *Note: the dialog to open the file will show the full, correct filename and whether it is executable or not.*
Aliases
0
alias CVE-2018-5173
Fixed_packages
0
url pkg:alpm/archlinux/firefox@60.0-1
purl pkg:alpm/archlinux/firefox@60.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@60.0-1
1
url pkg:deb/debian/firefox@60.0-1?distro=sid
purl pkg:deb/debian/firefox@60.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@60.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@59.0.2-3
purl pkg:alpm/archlinux/firefox@59.0.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1njr-8t2z-13ex
1
vulnerability VCID-2mf4-kpr7-3kcu
2
vulnerability VCID-4trh-3k93-97br
3
vulnerability VCID-4znr-5fxr-qqhc
4
vulnerability VCID-7ksf-b6g3-ukcc
5
vulnerability VCID-8vn5-q4h7-ffa6
6
vulnerability VCID-95qq-zty2-2qa8
7
vulnerability VCID-d4bx-x9pb-8kfx
8
vulnerability VCID-ewqm-puf8-hkbv
9
vulnerability VCID-g7fw-yt1c-fqht
10
vulnerability VCID-geb6-buda-4fdb
11
vulnerability VCID-jtrv-jyme-sybh
12
vulnerability VCID-kufd-jgaq-jfd2
13
vulnerability VCID-mfwc-dm4n-vbey
14
vulnerability VCID-q3au-wru3-pbet
15
vulnerability VCID-qvj2-uwha-xff9
16
vulnerability VCID-rjjb-7ycx-cuaa
17
vulnerability VCID-rpj2-156g-aqcu
18
vulnerability VCID-tkmh-549z-4qhd
19
vulnerability VCID-v96d-equt-6bay
20
vulnerability VCID-w3wj-w2gp-kqh4
21
vulnerability VCID-w41h-2xyb-h3fj
22
vulnerability VCID-w44w-qwmk-mbbd
23
vulnerability VCID-zxn1-pdzk-sfdb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@59.0.2-3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5173.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5173
reference_id
reference_type
scores
0
value 0.01028
scoring_system epss
scoring_elements 0.77238
published_at 2026-04-01T12:55:00Z
1
value 0.01028
scoring_system epss
scoring_elements 0.77331
published_at 2026-04-21T12:55:00Z
2
value 0.01028
scoring_system epss
scoring_elements 0.77302
published_at 2026-04-12T12:55:00Z
3
value 0.01028
scoring_system epss
scoring_elements 0.773
published_at 2026-04-13T12:55:00Z
4
value 0.01028
scoring_system epss
scoring_elements 0.7734
published_at 2026-04-16T12:55:00Z
5
value 0.01028
scoring_system epss
scoring_elements 0.77339
published_at 2026-04-18T12:55:00Z
6
value 0.01028
scoring_system epss
scoring_elements 0.77245
published_at 2026-04-02T12:55:00Z
7
value 0.01028
scoring_system epss
scoring_elements 0.77273
published_at 2026-04-04T12:55:00Z
8
value 0.01028
scoring_system epss
scoring_elements 0.77256
published_at 2026-04-07T12:55:00Z
9
value 0.01028
scoring_system epss
scoring_elements 0.77287
published_at 2026-04-08T12:55:00Z
10
value 0.01028
scoring_system epss
scoring_elements 0.77296
published_at 2026-04-09T12:55:00Z
11
value 0.01028
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5173
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1438025
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1438025
3
reference_url https://www.mozilla.org/security/advisories/mfsa2018-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-11/
4
reference_url http://www.securityfocus.com/bid/104139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104139
5
reference_url http://www.securitytracker.com/id/1040896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040896
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576272
reference_id 1576272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576272
7
reference_url https://security.archlinux.org/ASA-201805-10
reference_id ASA-201805-10
reference_type
scores
url https://security.archlinux.org/ASA-201805-10
8
reference_url https://security.archlinux.org/AVG-693
reference_id AVG-693
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-693
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5173
reference_id CVE-2018-5173
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-5173
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
reference_id mfsa2018-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
16
reference_url https://usn.ubuntu.com/3645-1/
reference_id USN-3645-1
reference_type
scores
url https://usn.ubuntu.com/3645-1/
Weaknesses
0
cwe_id 451
name User Interface (UI) Misrepresentation of Critical Information
description The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score5.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-q3au-wru3-pbet