Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@52.0-5?arch=el7_3
Typerpm
Namespaceredhat
Namefirefox
Version52.0-5
Qualifiers
arch el7_3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-ngw4-xb6d-gqfm
vulnerability_id VCID-ngw4-xb6d-gqfm
summary An integer overflow in createImageBitmap() was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the createImageBitmap API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2017-0558.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0558.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5428
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58778
published_at 2026-04-01T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58882
published_at 2026-04-29T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58914
published_at 2026-04-16T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58919
published_at 2026-04-18T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58897
published_at 2026-04-21T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.5888
published_at 2026-04-24T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58896
published_at 2026-04-26T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58852
published_at 2026-04-02T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58875
published_at 2026-04-04T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58843
published_at 2026-05-05T12:55:00Z
10
value 0.00371
scoring_system epss
scoring_elements 0.58895
published_at 2026-04-08T12:55:00Z
11
value 0.00371
scoring_system epss
scoring_elements 0.58901
published_at 2026-04-09T12:55:00Z
12
value 0.00371
scoring_system epss
scoring_elements 0.58918
published_at 2026-04-11T12:55:00Z
13
value 0.00371
scoring_system epss
scoring_elements 0.589
published_at 2026-04-12T12:55:00Z
14
value 0.00371
scoring_system epss
scoring_elements 0.58881
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5428
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-08/
6
reference_url http://www.securityfocus.com/bid/96959
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96959
7
reference_url http://www.securitytracker.com/id/1038060
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038060
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433202
reference_id 1433202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433202
9
reference_url https://security.archlinux.org/ASA-201703-15
reference_id ASA-201703-15
reference_type
scores
url https://security.archlinux.org/ASA-201703-15
10
reference_url https://security.archlinux.org/AVG-219
reference_id AVG-219
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-219
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5428
reference_id CVE-2017-5428
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5428
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-08
reference_id mfsa2017-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-08
24
reference_url https://access.redhat.com/errata/RHSA-2017:0558
reference_id RHSA-2017:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0558
25
reference_url https://usn.ubuntu.com/3238-1/
reference_id USN-3238-1
reference_type
scores
url https://usn.ubuntu.com/3238-1/
fixed_packages
aliases CVE-2017-5428
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngw4-xb6d-gqfm
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.0-5%3Farch=el7_3