Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-39za-a75a-z7c3
SummaryOn Linux systems, if the content process is compromised, the sandbox broker will allow files to be truncated even though the sandbox explicitly only has read access to the local file system and no write permissions. *Note: This attack only affects the Linux operating system. Other operating systems are not affected.*
Aliases
0
alias CVE-2017-7794
Fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
1
url pkg:deb/debian/firefox@55.0-1?distro=sid
purl pkg:deb/debian/firefox@55.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@55.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
5
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
6
url pkg:deb/debian/firefox@150.0.2-1?distro=sid
purl pkg:deb/debian/firefox@150.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid
7
url pkg:deb/debian/firefox@150.0.3-1?distro=sid
purl pkg:deb/debian/firefox@150.0.3-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@54.0.1-1
purl pkg:alpm/archlinux/firefox@54.0.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39za-a75a-z7c3
1
vulnerability VCID-3cbn-278y-hkah
2
vulnerability VCID-48em-7yxs-pqf9
3
vulnerability VCID-4rt5-58ue-sufc
4
vulnerability VCID-6aqn-abjb-skbd
5
vulnerability VCID-7mvz-mr2e-hyfx
6
vulnerability VCID-9cje-24ah-p7fk
7
vulnerability VCID-d7jf-wx4p-cuek
8
vulnerability VCID-dck1-2x3v-1ygr
9
vulnerability VCID-eaau-g1uf-73gd
10
vulnerability VCID-f7ut-fqny-tffr
11
vulnerability VCID-gf3v-rmys-syex
12
vulnerability VCID-hd7u-f91y-dqhz
13
vulnerability VCID-hk7b-ckyd-7qg2
14
vulnerability VCID-hw2h-w5r2-7qhv
15
vulnerability VCID-kn3f-cx36-17h2
16
vulnerability VCID-nmws-nx6k-5qbe
17
vulnerability VCID-np75-dzzq-8yef
18
vulnerability VCID-q7jk-b69d-bbav
19
vulnerability VCID-qetw-2ah7-5ba4
20
vulnerability VCID-qh1k-c7ct-efg8
21
vulnerability VCID-s558-4jac-47ft
22
vulnerability VCID-vgwu-jbjv-xyd1
23
vulnerability VCID-xzxb-5pq8-9bfd
24
vulnerability VCID-yk2z-f6vu-93fb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0.1-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7794.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7794
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14221
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14307
published_at 2026-05-14T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14066
published_at 2026-04-29T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.13938
published_at 2026-05-05T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14095
published_at 2026-05-07T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14183
published_at 2026-05-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14171
published_at 2026-05-11T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14213
published_at 2026-05-12T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14299
published_at 2026-04-02T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14362
published_at 2026-04-04T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.1417
published_at 2026-04-07T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14252
published_at 2026-04-08T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14306
published_at 2026-04-09T12:55:00Z
13
value 0.00046
scoring_system epss
scoring_elements 0.14253
published_at 2026-04-11T12:55:00Z
14
value 0.00046
scoring_system epss
scoring_elements 0.14215
published_at 2026-04-12T12:55:00Z
15
value 0.00046
scoring_system epss
scoring_elements 0.14158
published_at 2026-04-13T12:55:00Z
16
value 0.00046
scoring_system epss
scoring_elements 0.14049
published_at 2026-04-16T12:55:00Z
17
value 0.00046
scoring_system epss
scoring_elements 0.14048
published_at 2026-04-18T12:55:00Z
18
value 0.00046
scoring_system epss
scoring_elements 0.14125
published_at 2026-04-21T12:55:00Z
19
value 0.00046
scoring_system epss
scoring_elements 0.14159
published_at 2026-04-24T12:55:00Z
20
value 0.00046
scoring_system epss
scoring_elements 0.14135
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7794
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1374281
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1374281
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:C/A:C
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
5
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479211
reference_id 1479211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479211
7
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
8
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7794
reference_id CVE-2017-7794
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7794
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
13
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
Weaknesses
0
cwe_id 250
name Execution with Unnecessary Privileges
description The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
1
cwe_id 276
name Incorrect Default Permissions
description During installation, installed file permissions are set to allow anyone to modify those files.
Exploits
Severity_range_score4.6 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-39za-a75a-z7c3