Search for vulnerabilities
| Vulnerability ID | VCID-6wy1-juan-8ua8 |
| Aliases |
CVE-2017-5417
|
| Summary | When dragging content from the primary browser pane to the addressbar on a malicious site, it is possible to change the addressbar so that the displayed location following navigation does not match the URL of the newly loaded page. This allows for spoofing attacks. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 9.0 |
| Risk | 4.5 |
| Affected and Fixed Packages | Package Details |
| CWE-20 | Improper Input Validation |
| System | Score | Found at |
|---|---|---|
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| epss | 0.00369 | https://api.first.org/data/v1/epss?cve=CVE-2017-5417 |
| cvssv2 | 6.8 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| cvssv2 | 5.0 | https://nvd.nist.gov/vuln/detail/CVE-2017-5417 |
| cvssv3 | 5.3 | https://nvd.nist.gov/vuln/detail/CVE-2017-5417 |
| archlinux | Critical | https://security.archlinux.org/AVG-194 |
| generic_textual | critical | https://www.mozilla.org/en-US/security/advisories/mfsa2017-05 |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.58661 |
| EPSS Score | 0.00369 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:16:41.577618+00:00 | Mozilla Importer | Import | https://github.com/mozilla/foundation-security-advisories/blob/master/announce/2017/mfsa2017-05.yml | 38.0.0 |