Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ngw4-xb6d-gqfm
SummaryAn integer overflow in createImageBitmap() was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the createImageBitmap API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer.
Aliases
0
alias CVE-2017-5428
Fixed_packages
0
url pkg:alpm/archlinux/firefox@52.0.1-1
purl pkg:alpm/archlinux/firefox@52.0.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0.1-1
1
url pkg:deb/debian/firefox@52.0.1-1?distro=sid
purl pkg:deb/debian/firefox@52.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@52.0.1-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
5
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
6
url pkg:deb/debian/firefox@150.0.2-1?distro=sid
purl pkg:deb/debian/firefox@150.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid
7
url pkg:deb/debian/firefox-esr@0?distro=trixie
purl pkg:deb/debian/firefox-esr@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@0%3Fdistro=trixie
8
url pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
purl pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3a6f-173h-fqbz
2
vulnerability VCID-3kv6-c148-nkhq
3
vulnerability VCID-4e49-6tg2-e7d9
4
vulnerability VCID-59d3-343b-e3aw
5
vulnerability VCID-5dw5-vpt8-zqbz
6
vulnerability VCID-61r1-arbe-dke4
7
vulnerability VCID-7jt2-zr49-7ye5
8
vulnerability VCID-95et-ezmb-buau
9
vulnerability VCID-9ag7-z86d-nba9
10
vulnerability VCID-9nbw-7c9e-13af
11
vulnerability VCID-av7u-3g4m-mugm
12
vulnerability VCID-bwth-uepr-z7a3
13
vulnerability VCID-cjsm-7gxr-8ygw
14
vulnerability VCID-d16s-p141-qbft
15
vulnerability VCID-fxjm-ywug-f3d5
16
vulnerability VCID-hk2m-rbdy-nqhc
17
vulnerability VCID-ma29-qa7e-9qb4
18
vulnerability VCID-nge1-4cvg-zqb2
19
vulnerability VCID-nyum-jpbc-abew
20
vulnerability VCID-p6yz-xs58-u3gm
21
vulnerability VCID-pfmd-zv8f-8bfc
22
vulnerability VCID-pszh-x9gd-xyg4
23
vulnerability VCID-q689-wneh-hbdq
24
vulnerability VCID-q8qp-5szp-mfe8
25
vulnerability VCID-qbzp-euvv-q7c7
26
vulnerability VCID-ruqn-mk9t-57hb
27
vulnerability VCID-tv7r-qf2c-dqbm
28
vulnerability VCID-ufku-v5vq-4yef
29
vulnerability VCID-w98r-yagc-kkec
30
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie
9
url pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
purl pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a6f-173h-fqbz
1
vulnerability VCID-4e49-6tg2-e7d9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-pszh-x9gd-xyg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie
10
url pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a6f-173h-fqbz
1
vulnerability VCID-4e49-6tg2-e7d9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-pszh-x9gd-xyg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie
11
url pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5dw5-vpt8-zqbz
1
vulnerability VCID-9ag7-z86d-nba9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-qbzp-euvv-q7c7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie
12
url pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2fqb-r5zb-a7dp
1
vulnerability VCID-3kv6-c148-nkhq
2
vulnerability VCID-59d3-343b-e3aw
3
vulnerability VCID-61r1-arbe-dke4
4
vulnerability VCID-7jt2-zr49-7ye5
5
vulnerability VCID-95et-ezmb-buau
6
vulnerability VCID-9nbw-7c9e-13af
7
vulnerability VCID-av7u-3g4m-mugm
8
vulnerability VCID-bwth-uepr-z7a3
9
vulnerability VCID-cjsm-7gxr-8ygw
10
vulnerability VCID-d16s-p141-qbft
11
vulnerability VCID-f81v-9fv8-93cd
12
vulnerability VCID-fxjm-ywug-f3d5
13
vulnerability VCID-hk2m-rbdy-nqhc
14
vulnerability VCID-ma29-qa7e-9qb4
15
vulnerability VCID-nge1-4cvg-zqb2
16
vulnerability VCID-nyum-jpbc-abew
17
vulnerability VCID-p6yz-xs58-u3gm
18
vulnerability VCID-pfmd-zv8f-8bfc
19
vulnerability VCID-q689-wneh-hbdq
20
vulnerability VCID-q8qp-5szp-mfe8
21
vulnerability VCID-ruqn-mk9t-57hb
22
vulnerability VCID-tv7r-qf2c-dqbm
23
vulnerability VCID-w98r-yagc-kkec
24
vulnerability VCID-z6tm-b352-5uhk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie
13
url pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.10.0esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1y9d-wx59-fyh2
1
vulnerability VCID-9uk1-zvat-5qc9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-ndwm-svz7-5uen
4
vulnerability VCID-zkbj-717t-j3hw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1%3Fdistro=trixie
14
url pkg:deb/debian/firefox-esr@140.10.1esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.10.1esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3a6f-173h-fqbz
1
vulnerability VCID-4e49-6tg2-e7d9
2
vulnerability VCID-f81v-9fv8-93cd
3
vulnerability VCID-pszh-x9gd-xyg4
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.1esr-1%3Fdistro=trixie
15
url pkg:deb/debian/firefox-esr@140.10.2esr-1?distro=trixie
purl pkg:deb/debian/firefox-esr@140.10.2esr-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-f81v-9fv8-93cd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.2esr-1%3Fdistro=trixie
16
url pkg:mozilla/Firefox@52.0.1
purl pkg:mozilla/Firefox@52.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@52.0.1
17
url pkg:mozilla/Firefox%20ESR@52.0.1
purl pkg:mozilla/Firefox%20ESR@52.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@52.0.1
Affected_packages
0
url pkg:alpm/archlinux/firefox@52.0-2
purl pkg:alpm/archlinux/firefox@52.0-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ngw4-xb6d-gqfm
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@52.0-2
1
url pkg:rpm/redhat/firefox@52.0-5?arch=el7_3
purl pkg:rpm/redhat/firefox@52.0-5?arch=el7_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ngw4-xb6d-gqfm
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@52.0-5%3Farch=el7_3
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2017-0558.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0558.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5428.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5428
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58778
published_at 2026-04-01T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58891
published_at 2026-05-07T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58919
published_at 2026-04-18T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58897
published_at 2026-04-21T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.5888
published_at 2026-04-24T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58896
published_at 2026-04-26T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58882
published_at 2026-04-29T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58852
published_at 2026-04-02T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58875
published_at 2026-04-04T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58843
published_at 2026-05-05T12:55:00Z
10
value 0.00371
scoring_system epss
scoring_elements 0.58895
published_at 2026-04-08T12:55:00Z
11
value 0.00371
scoring_system epss
scoring_elements 0.58901
published_at 2026-04-09T12:55:00Z
12
value 0.00371
scoring_system epss
scoring_elements 0.58918
published_at 2026-04-11T12:55:00Z
13
value 0.00371
scoring_system epss
scoring_elements 0.589
published_at 2026-04-12T12:55:00Z
14
value 0.00371
scoring_system epss
scoring_elements 0.58881
published_at 2026-04-13T12:55:00Z
15
value 0.00371
scoring_system epss
scoring_elements 0.58914
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5428
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-08/
6
reference_url http://www.securityfocus.com/bid/96959
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/96959
7
reference_url http://www.securitytracker.com/id/1038060
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038060
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1433202
reference_id 1433202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1433202
9
reference_url https://security.archlinux.org/ASA-201703-15
reference_id ASA-201703-15
reference_type
scores
url https://security.archlinux.org/ASA-201703-15
10
reference_url https://security.archlinux.org/AVG-219
reference_id AVG-219
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-219
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5428
reference_id CVE-2017-5428
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5428
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-08
reference_id mfsa2017-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-08
24
reference_url https://access.redhat.com/errata/RHSA-2017:0558
reference_id RHSA-2017:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0558
25
reference_url https://usn.ubuntu.com/3238-1/
reference_id USN-3238-1
reference_type
scores
url https://usn.ubuntu.com/3238-1/
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score7.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ngw4-xb6d-gqfm