Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vzwe-r2ms-m7bv
Summary
Mozilla engineer Matt Wobensmith reported that Content Security Policy
(CSP) does not block the loading of cross-domain Java applets when specified by policy.
This is because the Java applet is loaded by the Java plugin, which then mediates all
network requests without checking against CSP. This could allow a malicious site to
manipulate content through a Java applet to bypass CSP protections, allowing for possible
cross-site scripting (XSS) attacks.
Aliases
0
alias CVE-2016-2833
Fixed_packages
0
url pkg:deb/debian/firefox@47.0-1?distro=sid
purl pkg:deb/debian/firefox@47.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@47.0-1%3Fdistro=sid
1
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
3
url pkg:deb/debian/firefox-esr@0?distro=trixie
purl pkg:deb/debian/firefox-esr@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie
4
url pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie
5
url pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie
6
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie
7
url pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie
8
url pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie
9
url pkg:mozilla/Firefox@47.0.0
purl pkg:mozilla/Firefox@47.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@47.0.0
Affected_packages
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2833.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2833.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2833
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49457
published_at 2026-04-18T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49363
published_at 2026-04-01T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.4944
published_at 2026-04-11T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-12T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49413
published_at 2026-04-13T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.4946
published_at 2026-04-16T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49392
published_at 2026-04-02T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49419
published_at 2026-04-04T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49372
published_at 2026-04-07T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49427
published_at 2026-04-21T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49422
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2833
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=908933
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=908933
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-60.html
7
reference_url http://www.securitytracker.com/id/1036057
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036057
8
reference_url http://www.ubuntu.com/usn/USN-2993-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2993-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1342900
reference_id 1342900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1342900
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833
reference_id CVE-2016-2833
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2833
reference_id CVE-2016-2833
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-2833
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-60
reference_id mfsa2016-60
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-60
21
reference_url https://usn.ubuntu.com/2993-1/
reference_id USN-2993-1
reference_type
scores
url https://usn.ubuntu.com/2993-1/
Weaknesses
0
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
1
cwe_id 254
name 7PK - Security Features
description Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Exploits
Severity_range_score4.3 - 6.8
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vzwe-r2ms-m7bv