Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-geb6-buda-4fdb
SummaryMozilla developers and community members Christoph Diehl, Christian Holler, Jon Coppeard, Jason Kratzer, Nathan Froyd, Paul Theriault, Ryan VanderMeulen, Tyson Smith, Sebastian Hengst, Byron Campen, Emilio Cobos Álvarez, Ronald Crane, and Phillipp reported memory safety bugs present in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code.
Aliases
0
alias CVE-2018-5151
Fixed_packages
0
url pkg:alpm/archlinux/firefox@60.0-1
purl pkg:alpm/archlinux/firefox@60.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@60.0-1
1
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@60.0-1?distro=sid
purl pkg:deb/debian/firefox@60.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@60.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@59.0.2-3
purl pkg:alpm/archlinux/firefox@59.0.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1njr-8t2z-13ex
1
vulnerability VCID-2mf4-kpr7-3kcu
2
vulnerability VCID-4trh-3k93-97br
3
vulnerability VCID-4znr-5fxr-qqhc
4
vulnerability VCID-7ksf-b6g3-ukcc
5
vulnerability VCID-8vn5-q4h7-ffa6
6
vulnerability VCID-95qq-zty2-2qa8
7
vulnerability VCID-d4bx-x9pb-8kfx
8
vulnerability VCID-ewqm-puf8-hkbv
9
vulnerability VCID-g7fw-yt1c-fqht
10
vulnerability VCID-geb6-buda-4fdb
11
vulnerability VCID-jtrv-jyme-sybh
12
vulnerability VCID-kufd-jgaq-jfd2
13
vulnerability VCID-mfwc-dm4n-vbey
14
vulnerability VCID-q3au-wru3-pbet
15
vulnerability VCID-qvj2-uwha-xff9
16
vulnerability VCID-rjjb-7ycx-cuaa
17
vulnerability VCID-rpj2-156g-aqcu
18
vulnerability VCID-tkmh-549z-4qhd
19
vulnerability VCID-v96d-equt-6bay
20
vulnerability VCID-w3wj-w2gp-kqh4
21
vulnerability VCID-w41h-2xyb-h3fj
22
vulnerability VCID-w44w-qwmk-mbbd
23
vulnerability VCID-zxn1-pdzk-sfdb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@59.0.2-3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5151.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5151
reference_id
reference_type
scores
0
value 0.02742
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-21T12:55:00Z
1
value 0.02742
scoring_system epss
scoring_elements 0.86007
published_at 2026-04-18T12:55:00Z
2
value 0.0372
scoring_system epss
scoring_elements 0.87953
published_at 2026-04-07T12:55:00Z
3
value 0.0372
scoring_system epss
scoring_elements 0.87926
published_at 2026-04-01T12:55:00Z
4
value 0.0372
scoring_system epss
scoring_elements 0.8798
published_at 2026-04-09T12:55:00Z
5
value 0.0372
scoring_system epss
scoring_elements 0.87991
published_at 2026-04-11T12:55:00Z
6
value 0.0372
scoring_system epss
scoring_elements 0.87984
published_at 2026-04-12T12:55:00Z
7
value 0.0372
scoring_system epss
scoring_elements 0.87983
published_at 2026-04-13T12:55:00Z
8
value 0.0372
scoring_system epss
scoring_elements 0.87997
published_at 2026-04-16T12:55:00Z
9
value 0.0372
scoring_system epss
scoring_elements 0.87936
published_at 2026-04-02T12:55:00Z
10
value 0.0372
scoring_system epss
scoring_elements 0.87949
published_at 2026-04-04T12:55:00Z
11
value 0.0372
scoring_system epss
scoring_elements 0.87974
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5151
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1445234%2C1449530%2C1437455%2C1447989%2C1438827%2C1436983%2C1435036%2C1440465%2C1439723%2C1448771%2C1453653%2C1454359%2C1432323%2C1454126%2C1436759%2C1439655%2C1448612%2C1449358%2C1367727%2C1452417
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1445234%2C1449530%2C1437455%2C1447989%2C1438827%2C1436983%2C1435036%2C1440465%2C1439723%2C1448771%2C1453653%2C1454359%2C1432323%2C1454126%2C1436759%2C1439655%2C1448612%2C1449358%2C1367727%2C1452417
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2018-11/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2018-11/
5
reference_url http://www.securityfocus.com/bid/104139
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104139
6
reference_url http://www.securitytracker.com/id/1040896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040896
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576251
reference_id 1576251
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576251
8
reference_url https://security.archlinux.org/ASA-201805-10
reference_id ASA-201805-10
reference_type
scores
url https://security.archlinux.org/ASA-201805-10
9
reference_url https://security.archlinux.org/AVG-693
reference_id AVG-693
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-693
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5151
reference_id CVE-2018-5151
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5151
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
reference_id mfsa2018-11
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2018-11
17
reference_url https://usn.ubuntu.com/3645-1/
reference_id USN-3645-1
reference_type
scores
url https://usn.ubuntu.com/3645-1/
Weaknesses
0
cwe_id 120
name Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
description The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
1
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Exploits
Severity_range_score8.8 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-geb6-buda-4fdb