Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-np75-dzzq-8yef
SummaryIf a long user name is used in a username/password combination in a site URL (such as http://UserName:Password@example.com), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service.
Aliases
0
alias CVE-2017-7783
Fixed_packages
0
url pkg:alpm/archlinux/firefox@55.0-1
purl pkg:alpm/archlinux/firefox@55.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@55.0-1
1
url pkg:deb/debian/firefox@55.0-1?distro=sid
purl pkg:deb/debian/firefox@55.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@55.0-1%3Fdistro=sid
2
url pkg:deb/debian/firefox@149.0-1?distro=sid
purl pkg:deb/debian/firefox@149.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid
3
url pkg:deb/debian/firefox@149.0.2-1?distro=sid
purl pkg:deb/debian/firefox@149.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid
4
url pkg:deb/debian/firefox@150.0-1?distro=sid
purl pkg:deb/debian/firefox@150.0-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid
5
url pkg:deb/debian/firefox@150.0.1-1?distro=sid
purl pkg:deb/debian/firefox@150.0.1-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid
6
url pkg:deb/debian/firefox@150.0.2-1?distro=sid
purl pkg:deb/debian/firefox@150.0.2-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid
7
url pkg:deb/debian/firefox@150.0.3-1?distro=sid
purl pkg:deb/debian/firefox@150.0.3-1?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.3-1%3Fdistro=sid
Affected_packages
0
url pkg:alpm/archlinux/firefox@54.0.1-1
purl pkg:alpm/archlinux/firefox@54.0.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-39za-a75a-z7c3
1
vulnerability VCID-3cbn-278y-hkah
2
vulnerability VCID-48em-7yxs-pqf9
3
vulnerability VCID-4rt5-58ue-sufc
4
vulnerability VCID-6aqn-abjb-skbd
5
vulnerability VCID-7mvz-mr2e-hyfx
6
vulnerability VCID-9cje-24ah-p7fk
7
vulnerability VCID-d7jf-wx4p-cuek
8
vulnerability VCID-dck1-2x3v-1ygr
9
vulnerability VCID-eaau-g1uf-73gd
10
vulnerability VCID-f7ut-fqny-tffr
11
vulnerability VCID-gf3v-rmys-syex
12
vulnerability VCID-hd7u-f91y-dqhz
13
vulnerability VCID-hk7b-ckyd-7qg2
14
vulnerability VCID-hw2h-w5r2-7qhv
15
vulnerability VCID-kn3f-cx36-17h2
16
vulnerability VCID-nmws-nx6k-5qbe
17
vulnerability VCID-np75-dzzq-8yef
18
vulnerability VCID-q7jk-b69d-bbav
19
vulnerability VCID-qetw-2ah7-5ba4
20
vulnerability VCID-qh1k-c7ct-efg8
21
vulnerability VCID-s558-4jac-47ft
22
vulnerability VCID-vgwu-jbjv-xyd1
23
vulnerability VCID-xzxb-5pq8-9bfd
24
vulnerability VCID-yk2z-f6vu-93fb
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@54.0.1-1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7783.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7783
reference_id
reference_type
scores
0
value 0.06903
scoring_system epss
scoring_elements 0.91343
published_at 2026-04-01T12:55:00Z
1
value 0.06903
scoring_system epss
scoring_elements 0.91478
published_at 2026-05-14T12:55:00Z
2
value 0.06903
scoring_system epss
scoring_elements 0.91423
published_at 2026-04-29T12:55:00Z
3
value 0.06903
scoring_system epss
scoring_elements 0.91438
published_at 2026-05-05T12:55:00Z
4
value 0.06903
scoring_system epss
scoring_elements 0.91453
published_at 2026-05-07T12:55:00Z
5
value 0.06903
scoring_system epss
scoring_elements 0.91462
published_at 2026-05-09T12:55:00Z
6
value 0.06903
scoring_system epss
scoring_elements 0.91461
published_at 2026-05-11T12:55:00Z
7
value 0.06903
scoring_system epss
scoring_elements 0.91471
published_at 2026-05-12T12:55:00Z
8
value 0.06903
scoring_system epss
scoring_elements 0.91349
published_at 2026-04-02T12:55:00Z
9
value 0.06903
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-04T12:55:00Z
10
value 0.06903
scoring_system epss
scoring_elements 0.91367
published_at 2026-04-07T12:55:00Z
11
value 0.06903
scoring_system epss
scoring_elements 0.91379
published_at 2026-04-08T12:55:00Z
12
value 0.06903
scoring_system epss
scoring_elements 0.91385
published_at 2026-04-09T12:55:00Z
13
value 0.06903
scoring_system epss
scoring_elements 0.91392
published_at 2026-04-11T12:55:00Z
14
value 0.06903
scoring_system epss
scoring_elements 0.91395
published_at 2026-04-12T12:55:00Z
15
value 0.06903
scoring_system epss
scoring_elements 0.91394
published_at 2026-04-13T12:55:00Z
16
value 0.06903
scoring_system epss
scoring_elements 0.91419
published_at 2026-04-16T12:55:00Z
17
value 0.06903
scoring_system epss
scoring_elements 0.91415
published_at 2026-04-18T12:55:00Z
18
value 0.06903
scoring_system epss
scoring_elements 0.91417
published_at 2026-04-21T12:55:00Z
19
value 0.06903
scoring_system epss
scoring_elements 0.91426
published_at 2026-04-24T12:55:00Z
20
value 0.06903
scoring_system epss
scoring_elements 0.91424
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7783
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1360842
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1360842
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.exploit-db.com/exploits/43020/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43020/
5
reference_url https://www.mozilla.org/security/advisories/mfsa2017-18/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2017-18/
6
reference_url http://www.securityfocus.com/bid/100401
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100401
7
reference_url http://www.securitytracker.com/id/1039124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039124
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1479176
reference_id 1479176
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1479176
9
reference_url https://security.archlinux.org/ASA-201708-3
reference_id ASA-201708-3
reference_type
scores
url https://security.archlinux.org/ASA-201708-3
10
reference_url https://security.archlinux.org/AVG-375
reference_id AVG-375
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-375
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43020.txt
reference_id CVE-2017-7783
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/43020.txt
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7783
reference_id CVE-2017-7783
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7783
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
reference_id mfsa2017-18
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2017-18
15
reference_url https://usn.ubuntu.com/3391-1/
reference_id USN-3391-1
reference_type
scores
url https://usn.ubuntu.com/3391-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
0
date_added 2017-10-20
description Mozilla Firefox < 55 - Denial of Service
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2017-10-20
exploit_type dos
platform multiple
source_date_updated 2017-10-20
data_source Exploit-DB
source_url
Severity_range_score5.0 - 10.0
Exploitability2.0
Weighted_severity9.0
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-np75-dzzq-8yef