Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-w41h-2xyb-h3fj
SummaryA vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs.
Aliases
0
alias CVE-2018-5177
Fixed_packages
0
url pkg:alpm/archlinux/firefox@60.0-1
purl pkg:alpm/archlinux/firefox@60.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@60.0-1
1
url pkg:deb/debian/firefox@60.0-1?distro=sid
purl pkg:deb/debian/firefox@60.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@60.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@59.0.2-3
purl pkg:alpm/archlinux/firefox@59.0.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1njr-8t2z-13ex
1
vulnerability VCID-2mf4-kpr7-3kcu
2
vulnerability VCID-4trh-3k93-97br
3
vulnerability VCID-4znr-5fxr-qqhc
4
vulnerability VCID-7ksf-b6g3-ukcc
5
vulnerability VCID-8vn5-q4h7-ffa6
6
vulnerability VCID-95qq-zty2-2qa8
7
vulnerability VCID-d4bx-x9pb-8kfx
8
vulnerability VCID-ewqm-puf8-hkbv
9
vulnerability VCID-g7fw-yt1c-fqht
10
vulnerability VCID-geb6-buda-4fdb
11
vulnerability VCID-jtrv-jyme-sybh
12
vulnerability VCID-kufd-jgaq-jfd2
13
vulnerability VCID-mfwc-dm4n-vbey
14
vulnerability VCID-q3au-wru3-pbet
15
vulnerability VCID-qvj2-uwha-xff9
16
vulnerability VCID-rjjb-7ycx-cuaa
17
vulnerability VCID-rpj2-156g-aqcu
18
vulnerability VCID-tkmh-549z-4qhd
19
vulnerability VCID-v96d-equt-6bay
20
vulnerability VCID-w3wj-w2gp-kqh4
21
vulnerability VCID-w41h-2xyb-h3fj
22
vulnerability VCID-w44w-qwmk-mbbd
23
vulnerability VCID-zxn1-pdzk-sfdb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@59.0.2-3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5177.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5177
reference_id
reference_type
scores
0
value 0.00303
scoring_system epss
scoring_elements 0.53544
published_at 2026-04-02T12:55:00Z
1
value 0.00303
scoring_system epss
scoring_elements 0.53522
published_at 2026-04-01T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75941
published_at 2026-04-21T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75922
published_at 2026-04-12T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-13T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75953
published_at 2026-04-16T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75955
published_at 2026-04-18T12:55:00Z
7
value 0.00917
scoring_system epss
scoring_elements 0.75896
published_at 2026-04-04T12:55:00Z
8
value 0.00917
scoring_system epss
scoring_elements 0.75876
published_at 2026-04-07T12:55:00Z
9
value 0.00917
scoring_system epss
scoring_elements 0.75908
published_at 2026-04-08T12:55:00Z
10
value 0.00917
scoring_system epss
scoring_elements 0.75921
published_at 2026-04-09T12:55:00Z
11
value 0.00917
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5177
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1451908
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1451908
3
reference_url https://www.mozilla.org/security/advisories/mfsa2018-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-11/
4
reference_url http://www.securityfocus.com/bid/104139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104139
5
reference_url http://www.securitytracker.com/id/1040896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040896
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576277
reference_id 1576277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576277
7
reference_url https://security.archlinux.org/ASA-201805-10
reference_id ASA-201805-10
reference_type
scores
url https://security.archlinux.org/ASA-201805-10
8
reference_url https://security.archlinux.org/AVG-693
reference_id AVG-693
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-693
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5177
reference_id CVE-2018-5177
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5177
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
reference_id mfsa2018-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
16
reference_url https://usn.ubuntu.com/3645-1/
reference_id USN-3645-1
reference_type
scores
url https://usn.ubuntu.com/3645-1/
Weaknesses
0
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score5.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-w41h-2xyb-h3fj