Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-t7wm-9sa4-2yff
Summary
Security researcher Ronald Crane reported two issues in the libGLES
portions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows
systems. The first of these is a missing bounds check leading to memory safety errors when
manipulating shaders which could result in the writing to unowned memory. The second issue
also affects shaders when insufficient memory is allocated for a shader attribute array,
leading to a buffer overflow. Both of these issues can lead to a potentially exploitable
crash.
These issues are specific to Windows and does not affect Linux or OS X
systems.
In general this flaw cannot be exploited through email in the
Thunderbird product because scripting is disabled, but is potentially a risk in
browser or browser-like contexts.
Aliases
0
alias CVE-2015-7178
Fixed_packages
0
url pkg:mozilla/Firefox@41.0.0
purl pkg:mozilla/Firefox@41.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@41.0.0
1
url pkg:mozilla/Firefox%20ESR@38.3.0
purl pkg:mozilla/Firefox%20ESR@38.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@38.3.0
2
url pkg:mozilla/SeaMonkey@2.38.0
purl pkg:mozilla/SeaMonkey@2.38.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.38.0
3
url pkg:mozilla/Thunderbird@38.3.0
purl pkg:mozilla/Thunderbird@38.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@38.3.0
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7178
reference_id
reference_type
scores
0
value 0.01524
scoring_system epss
scoring_elements 0.8133
published_at 2026-04-24T12:55:00Z
1
value 0.01524
scoring_system epss
scoring_elements 0.81207
published_at 2026-04-01T12:55:00Z
2
value 0.01524
scoring_system epss
scoring_elements 0.81215
published_at 2026-04-02T12:55:00Z
3
value 0.01524
scoring_system epss
scoring_elements 0.81239
published_at 2026-04-04T12:55:00Z
4
value 0.01524
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-07T12:55:00Z
5
value 0.01524
scoring_system epss
scoring_elements 0.81265
published_at 2026-04-08T12:55:00Z
6
value 0.01524
scoring_system epss
scoring_elements 0.81271
published_at 2026-04-09T12:55:00Z
7
value 0.01524
scoring_system epss
scoring_elements 0.81291
published_at 2026-04-11T12:55:00Z
8
value 0.01524
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-12T12:55:00Z
9
value 0.01524
scoring_system epss
scoring_elements 0.8127
published_at 2026-04-13T12:55:00Z
10
value 0.01524
scoring_system epss
scoring_elements 0.81307
published_at 2026-04-16T12:55:00Z
11
value 0.01524
scoring_system epss
scoring_elements 0.81309
published_at 2026-04-18T12:55:00Z
12
value 0.01524
scoring_system epss
scoring_elements 0.81308
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7178
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265201
reference_id 1265201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265201
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178
reference_id CVE-2015-7178
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-113
reference_id mfsa2015-113
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-113
Weaknesses
0
cwe_id 805
name Buffer Access with Incorrect Length Value
description The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer.
Exploits
Severity_range_score9.0 - 10.0
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff