Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-t7wm-9sa4-2yff |
| Summary | Security researcher Ronald Crane reported two issues in the libGLES
portions of the ANGLE graphics library, used for WebGL and OpenGL content on Windows
systems. The first of these is a missing bounds check leading to memory safety errors when
manipulating shaders which could result in the writing to unowned memory. The second issue
also affects shaders when insufficient memory is allocated for a shader attribute array,
leading to a buffer overflow. Both of these issues can lead to a potentially exploitable
crash.
These issues are specific to Windows and does not affect Linux or OS X
systems.
In general this flaw cannot be exploited through email in the
Thunderbird product because scripting is disabled, but is potentially a risk in
browser or browser-like contexts. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.8133 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81207 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81239 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81271 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.8127 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81307 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81309 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.01524 |
| scoring_system |
epss |
| scoring_elements |
0.81308 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
805 |
| name |
Buffer Access with Incorrect Length Value |
| description |
The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it to access memory that is outside of the bounds of the buffer. |
|
|
| Exploits |
|
| Severity_range_score | 9.0 - 10.0 |
| Exploitability | null |
| Weighted_severity | null |
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-t7wm-9sa4-2yff |