Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-hq7v-u57f-5uhc
SummaryA mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system.
Aliases
0
alias CVE-2017-5456
Fixed_packages
0
url pkg:alpm/archlinux/firefox@53.0-1
purl pkg:alpm/archlinux/firefox@53.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@53.0-1
1
url pkg:deb/debian/firefox@52.0.1-1?distro=sid
purl pkg:deb/debian/firefox@52.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0.1-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
5
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
6
url pkg:deb/debian/firefox@150.0.2-1?distro=sid
purl pkg:deb/debian/firefox@150.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid
7
url pkg:deb/debian/firefox@150.0.3-1?distro=sid
purl pkg:deb/debian/firefox@150.0.3-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@52.0.2-1
purl pkg:alpm/archlinux/firefox@52.0.2-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-3315-b7du-kydm
4
vulnerability VCID-3ega-m6fz-uugy
5
vulnerability VCID-4n3b-syg9-ykh9
6
vulnerability VCID-54vr-pby9-ffg7
7
vulnerability VCID-6a5y-dwev-93be
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-kxvg-qw8v-vydv
24
vulnerability VCID-pp4w-2986-nqee
25
vulnerability VCID-q72b-g1hz-23fs
26
vulnerability VCID-q83t-h55y-eyhv
27
vulnerability VCID-ru7n-21qs-eyfx
28
vulnerability VCID-rwnr-ngz9-akg1
29
vulnerability VCID-x4gg-h5q9-ufbc
30
vulnerability VCID-y2dd-vp7y-5ka1
31
vulnerability VCID-yaew-dtry-pkfv
32
vulnerability VCID-z4hp-wpp1-17bu
33
vulnerability VCID-zr38-6kvs-ckdh
34
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0.2-1
1
url pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
purl pkg:rpm/redhat/firefox@52.1.0-2?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1asm-t31q-w3ef
1
vulnerability VCID-23bx-as83-e3bv
2
vulnerability VCID-2j7g-g6dj-qydb
3
vulnerability VCID-2t1r-58sq-3uaf
4
vulnerability VCID-3315-b7du-kydm
5
vulnerability VCID-3ega-m6fz-uugy
6
vulnerability VCID-4n3b-syg9-ykh9
7
vulnerability VCID-54vr-pby9-ffg7
8
vulnerability VCID-6p3q-f7f6-mygv
9
vulnerability VCID-6sun-2gu6-jqh7
10
vulnerability VCID-77xw-dvy5-5uch
11
vulnerability VCID-79kw-syxy-n7a1
12
vulnerability VCID-8frm-8p43-pyh8
13
vulnerability VCID-8wgm-j522-4yac
14
vulnerability VCID-c11z-6f9c-3bb5
15
vulnerability VCID-dsuj-fmtr-cbft
16
vulnerability VCID-e43t-3b7n-c3bj
17
vulnerability VCID-f5dh-8kx7-vbfq
18
vulnerability VCID-f9dc-n2bd-gqdt
19
vulnerability VCID-h2zq-ubdu-sqc8
20
vulnerability VCID-hq7v-u57f-5uhc
21
vulnerability VCID-hthe-t85x-13gz
22
vulnerability VCID-jzb7-dve8-jygb
23
vulnerability VCID-pp4w-2986-nqee
24
vulnerability VCID-q72b-g1hz-23fs
25
vulnerability VCID-ru7n-21qs-eyfx
26
vulnerability VCID-tt4e-ufku-2yek
27
vulnerability VCID-wwx8-enxs-subd
28
vulnerability VCID-y2dd-vp7y-5ka1
29
vulnerability VCID-yaew-dtry-pkfv
30
vulnerability VCID-z4hp-wpp1-17bu
31
vulnerability VCID-zr38-6kvs-ckdh
32
vulnerability VCID-zyxf-mxw2-4yc1
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.1.0-2%3Farch=el7_3
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5456.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5456
reference_id
reference_type
scores
0
value 0.00347
scoring_system epss
scoring_elements 0.57349
published_at 2026-05-14T12:55:00Z
1
value 0.00347
scoring_system epss
scoring_elements 0.57254
published_at 2026-04-29T12:55:00Z
2
value 0.00347
scoring_system epss
scoring_elements 0.57205
published_at 2026-05-05T12:55:00Z
3
value 0.00347
scoring_system epss
scoring_elements 0.57249
published_at 2026-05-07T12:55:00Z
4
value 0.00347
scoring_system epss
scoring_elements 0.57311
published_at 2026-05-09T12:55:00Z
5
value 0.00347
scoring_system epss
scoring_elements 0.5726
published_at 2026-05-11T12:55:00Z
6
value 0.00347
scoring_system epss
scoring_elements 0.57284
published_at 2026-05-12T12:55:00Z
7
value 0.00347
scoring_system epss
scoring_elements 0.57186
published_at 2026-04-01T12:55:00Z
8
value 0.00347
scoring_system epss
scoring_elements 0.57267
published_at 2026-04-02T12:55:00Z
9
value 0.00347
scoring_system epss
scoring_elements 0.5729
published_at 2026-04-04T12:55:00Z
10
value 0.00347
scoring_system epss
scoring_elements 0.57266
published_at 2026-04-07T12:55:00Z
11
value 0.00347
scoring_system epss
scoring_elements 0.57318
published_at 2026-04-08T12:55:00Z
12
value 0.00347
scoring_system epss
scoring_elements 0.5732
published_at 2026-04-16T12:55:00Z
13
value 0.00347
scoring_system epss
scoring_elements 0.57333
published_at 2026-04-11T12:55:00Z
14
value 0.00347
scoring_system epss
scoring_elements 0.57313
published_at 2026-04-12T12:55:00Z
15
value 0.00347
scoring_system epss
scoring_elements 0.57292
published_at 2026-04-13T12:55:00Z
16
value 0.00347
scoring_system epss
scoring_elements 0.57316
published_at 2026-04-18T12:55:00Z
17
value 0.00347
scoring_system epss
scoring_elements 0.57295
published_at 2026-04-21T12:55:00Z
18
value 0.00347
scoring_system epss
scoring_elements 0.57251
published_at 2026-04-24T12:55:00Z
19
value 0.00347
scoring_system epss
scoring_elements 0.57275
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5456
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1344415
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1344415
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-10/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-12/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-12/
6
reference_url http://www.securityfocus.com/bid/97940
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97940
7
reference_url http://www.securitytracker.com/id/1038320
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038320
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443297
reference_id 1443297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443297
9
reference_url https://security.archlinux.org/ASA-201704-6
reference_id ASA-201704-6
reference_type
scores
url https://security.archlinux.org/ASA-201704-6
10
reference_url https://security.archlinux.org/AVG-249
reference_id AVG-249
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-249
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5456
reference_id CVE-2017-5456
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5456
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
reference_id mfsa2017-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
reference_id mfsa2017-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-12
24
reference_url https://access.redhat.com/errata/RHSA-2017:1106
reference_id RHSA-2017:1106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1106
25
reference_url https://usn.ubuntu.com/3260-1/
reference_id USN-3260-1
reference_type
scores
url https://usn.ubuntu.com/3260-1/
Weaknesses
0
cwe_id 732
name Incorrect Permission Assignment for Critical Resource
description The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Exploits
Severity_range_score5.1 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-hq7v-u57f-5uhc