Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@78.3.0-1?arch=el7_9
Typerpm
Namespaceredhat
Namefirefox
Version78.3.0-1
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-28dd-azvp-pkeu
vulnerability_id VCID-28dd-azvp-pkeu
summary Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15648.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15648
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54741
published_at 2026-04-18T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54739
published_at 2026-04-16T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54722
published_at 2026-04-12T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54701
published_at 2026-04-13T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54615
published_at 2026-04-01T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54686
published_at 2026-04-02T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54708
published_at 2026-04-04T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54677
published_at 2026-04-07T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.5473
published_at 2026-04-08T12:55:00Z
9
value 0.00316
scoring_system epss
scoring_elements 0.54726
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872537
reference_id 1872537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872537
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-28
reference_id mfsa2020-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-28
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
6
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
7
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
8
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
9
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
fixed_packages
aliases CVE-2020-15648
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28dd-azvp-pkeu
1
url VCID-6h7s-a74e-33c1
vulnerability_id VCID-6h7s-a74e-33c1
summary Mozilla developer Anne van Kesteren discovered that <iframe sandbox> with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15653
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51876
published_at 2026-04-18T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51814
published_at 2026-04-08T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51811
published_at 2026-04-09T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51862
published_at 2026-04-11T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51842
published_at 2026-04-12T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51827
published_at 2026-04-13T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51869
published_at 2026-04-16T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51724
published_at 2026-04-01T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51773
published_at 2026-04-02T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51799
published_at 2026-04-04T12:55:00Z
10
value 0.00284
scoring_system epss
scoring_elements 0.51759
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15653
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1861645
reference_id 1861645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1861645
4
reference_url https://security.archlinux.org/AVG-1213
reference_id AVG-1213
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1213
5
reference_url https://security.archlinux.org/AVG-1214
reference_id AVG-1214
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1214
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
reference_id mfsa2020-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
reference_id mfsa2020-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
reference_id mfsa2020-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
9
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
10
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
11
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
12
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
13
reference_url https://usn.ubuntu.com/4443-1/
reference_id USN-4443-1
reference_type
scores
url https://usn.ubuntu.com/4443-1/
fixed_packages
aliases CVE-2020-15653
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6h7s-a74e-33c1
2
url VCID-75fd-w925-4qh4
vulnerability_id VCID-75fd-w925-4qh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15676.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15676.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15676
reference_id
reference_type
scores
0
value 0.00808
scoring_system epss
scoring_elements 0.74236
published_at 2026-04-18T12:55:00Z
1
value 0.01265
scoring_system epss
scoring_elements 0.7942
published_at 2026-04-07T12:55:00Z
2
value 0.01265
scoring_system epss
scoring_elements 0.79478
published_at 2026-04-11T12:55:00Z
3
value 0.01265
scoring_system epss
scoring_elements 0.79462
published_at 2026-04-12T12:55:00Z
4
value 0.01265
scoring_system epss
scoring_elements 0.79451
published_at 2026-04-13T12:55:00Z
5
value 0.01265
scoring_system epss
scoring_elements 0.79481
published_at 2026-04-16T12:55:00Z
6
value 0.01265
scoring_system epss
scoring_elements 0.79403
published_at 2026-04-01T12:55:00Z
7
value 0.01265
scoring_system epss
scoring_elements 0.7941
published_at 2026-04-02T12:55:00Z
8
value 0.01265
scoring_system epss
scoring_elements 0.79433
published_at 2026-04-04T12:55:00Z
9
value 0.01265
scoring_system epss
scoring_elements 0.79447
published_at 2026-04-08T12:55:00Z
10
value 0.01265
scoring_system epss
scoring_elements 0.79456
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15676
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881665
reference_id 1881665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881665
7
reference_url https://security.archlinux.org/ASA-202009-10
reference_id ASA-202009-10
reference_type
scores
url https://security.archlinux.org/ASA-202009-10
8
reference_url https://security.archlinux.org/AVG-1235
reference_id AVG-1235
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1235
9
reference_url https://security.gentoo.org/glsa/202010-02
reference_id GLSA-202010-02
reference_type
scores
url https://security.gentoo.org/glsa/202010-02
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
reference_id mfsa2020-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
reference_id mfsa2020-43
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
reference_id mfsa2020-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
13
reference_url https://access.redhat.com/errata/RHSA-2020:3832
reference_id RHSA-2020:3832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3832
14
reference_url https://access.redhat.com/errata/RHSA-2020:3833
reference_id RHSA-2020:3833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3833
15
reference_url https://access.redhat.com/errata/RHSA-2020:3834
reference_id RHSA-2020:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3834
16
reference_url https://access.redhat.com/errata/RHSA-2020:3835
reference_id RHSA-2020:3835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3835
17
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
18
reference_url https://access.redhat.com/errata/RHSA-2020:4155
reference_id RHSA-2020:4155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4155
19
reference_url https://access.redhat.com/errata/RHSA-2020:4156
reference_id RHSA-2020:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4156
20
reference_url https://access.redhat.com/errata/RHSA-2020:4157
reference_id RHSA-2020:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4157
21
reference_url https://access.redhat.com/errata/RHSA-2020:4158
reference_id RHSA-2020:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4158
22
reference_url https://access.redhat.com/errata/RHSA-2020:4163
reference_id RHSA-2020:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4163
23
reference_url https://usn.ubuntu.com/4546-1/
reference_id USN-4546-1
reference_type
scores
url https://usn.ubuntu.com/4546-1/
fixed_packages
aliases CVE-2020-15676
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75fd-w925-4qh4
3
url VCID-8ztk-5sbf-6kez
vulnerability_id VCID-8ztk-5sbf-6kez
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15673.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15673
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.7522
published_at 2026-04-18T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75177
published_at 2026-04-13T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75189
published_at 2026-04-09T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75211
published_at 2026-04-11T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-12T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75214
published_at 2026-04-16T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-01T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-02T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75166
published_at 2026-04-04T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75143
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881667
reference_id 1881667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881667
8
reference_url https://security.archlinux.org/ASA-202009-10
reference_id ASA-202009-10
reference_type
scores
url https://security.archlinux.org/ASA-202009-10
9
reference_url https://security.archlinux.org/AVG-1235
reference_id AVG-1235
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1235
10
reference_url https://security.gentoo.org/glsa/202010-02
reference_id GLSA-202010-02
reference_type
scores
url https://security.gentoo.org/glsa/202010-02
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
reference_id mfsa2020-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
reference_id mfsa2020-43
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
reference_id mfsa2020-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
14
reference_url https://access.redhat.com/errata/RHSA-2020:3832
reference_id RHSA-2020:3832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3832
15
reference_url https://access.redhat.com/errata/RHSA-2020:3833
reference_id RHSA-2020:3833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3833
16
reference_url https://access.redhat.com/errata/RHSA-2020:3834
reference_id RHSA-2020:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3834
17
reference_url https://access.redhat.com/errata/RHSA-2020:3835
reference_id RHSA-2020:3835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3835
18
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
19
reference_url https://access.redhat.com/errata/RHSA-2020:4155
reference_id RHSA-2020:4155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4155
20
reference_url https://access.redhat.com/errata/RHSA-2020:4156
reference_id RHSA-2020:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4156
21
reference_url https://access.redhat.com/errata/RHSA-2020:4157
reference_id RHSA-2020:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4157
22
reference_url https://access.redhat.com/errata/RHSA-2020:4158
reference_id RHSA-2020:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4158
23
reference_url https://access.redhat.com/errata/RHSA-2020:4163
reference_id RHSA-2020:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4163
24
reference_url https://usn.ubuntu.com/4546-1/
reference_id USN-4546-1
reference_type
scores
url https://usn.ubuntu.com/4546-1/
fixed_packages
aliases CVE-2020-15673
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ztk-5sbf-6kez
4
url VCID-9tc4-qr6d-6kfu
vulnerability_id VCID-9tc4-qr6d-6kfu
summary When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15654
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.65647
published_at 2026-04-18T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65611
published_at 2026-04-08T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.65623
published_at 2026-04-09T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65642
published_at 2026-04-11T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65627
published_at 2026-04-12T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.65599
published_at 2026-04-13T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.65634
published_at 2026-04-16T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65513
published_at 2026-04-01T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65562
published_at 2026-04-02T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65592
published_at 2026-04-04T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.65558
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15654
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1861649
reference_id 1861649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1861649
4
reference_url https://security.archlinux.org/AVG-1213
reference_id AVG-1213
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1213
5
reference_url https://security.archlinux.org/AVG-1214
reference_id AVG-1214
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1214
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
reference_id mfsa2020-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
reference_id mfsa2020-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
reference_id mfsa2020-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
9
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
10
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
11
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
12
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
13
reference_url https://usn.ubuntu.com/4443-1/
reference_id USN-4443-1
reference_type
scores
url https://usn.ubuntu.com/4443-1/
fixed_packages
aliases CVE-2020-15654
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tc4-qr6d-6kfu
5
url VCID-g3mn-nhq4-zbhv
vulnerability_id VCID-g3mn-nhq4-zbhv
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12424.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12424
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36903
published_at 2026-04-18T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36875
published_at 2026-04-13T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.3692
published_at 2026-04-16T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36841
published_at 2026-04-01T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36998
published_at 2026-04-02T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.37032
published_at 2026-04-04T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36861
published_at 2026-04-07T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36912
published_at 2026-04-08T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36927
published_at 2026-04-09T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36935
published_at 2026-04-11T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12424
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872539
reference_id 1872539
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872539
3
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
6
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
7
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
8
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
9
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
10
reference_url https://usn.ubuntu.com/4408-1/
reference_id USN-4408-1
reference_type
scores
url https://usn.ubuntu.com/4408-1/
fixed_packages
aliases CVE-2020-12424
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3mn-nhq4-zbhv
6
url VCID-h4r6-jrxh-6kcf
vulnerability_id VCID-h4r6-jrxh-6kcf
summary
JIT optimizations involving the Javascript arguments object could confuse later optimizations.
This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15656
reference_id
reference_type
scores
0
value 0.00695
scoring_system epss
scoring_elements 0.71944
published_at 2026-04-18T12:55:00Z
1
value 0.00695
scoring_system epss
scoring_elements 0.71897
published_at 2026-04-08T12:55:00Z
2
value 0.00695
scoring_system epss
scoring_elements 0.71908
published_at 2026-04-09T12:55:00Z
3
value 0.00695
scoring_system epss
scoring_elements 0.71932
published_at 2026-04-11T12:55:00Z
4
value 0.00695
scoring_system epss
scoring_elements 0.71915
published_at 2026-04-12T12:55:00Z
5
value 0.00695
scoring_system epss
scoring_elements 0.71898
published_at 2026-04-13T12:55:00Z
6
value 0.00695
scoring_system epss
scoring_elements 0.7194
published_at 2026-04-16T12:55:00Z
7
value 0.00695
scoring_system epss
scoring_elements 0.71858
published_at 2026-04-01T12:55:00Z
8
value 0.00695
scoring_system epss
scoring_elements 0.71867
published_at 2026-04-02T12:55:00Z
9
value 0.00695
scoring_system epss
scoring_elements 0.71886
published_at 2026-04-04T12:55:00Z
10
value 0.00695
scoring_system epss
scoring_elements 0.71859
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15656
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1861646
reference_id 1861646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1861646
4
reference_url https://security.archlinux.org/AVG-1213
reference_id AVG-1213
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1213
5
reference_url https://security.archlinux.org/AVG-1214
reference_id AVG-1214
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1214
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
reference_id mfsa2020-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
reference_id mfsa2020-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
reference_id mfsa2020-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
9
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
10
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
11
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
12
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
13
reference_url https://usn.ubuntu.com/4443-1/
reference_id USN-4443-1
reference_type
scores
url https://usn.ubuntu.com/4443-1/
fixed_packages
aliases CVE-2020-15656
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4r6-jrxh-6kcf
7
url VCID-p6nb-kyzu-bbdf
vulnerability_id VCID-p6nb-kyzu-bbdf
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12425.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12425
reference_id
reference_type
scores
0
value 0.00537
scoring_system epss
scoring_elements 0.67584
published_at 2026-04-18T12:55:00Z
1
value 0.00537
scoring_system epss
scoring_elements 0.67535
published_at 2026-04-13T12:55:00Z
2
value 0.00537
scoring_system epss
scoring_elements 0.67571
published_at 2026-04-16T12:55:00Z
3
value 0.00537
scoring_system epss
scoring_elements 0.67459
published_at 2026-04-01T12:55:00Z
4
value 0.00537
scoring_system epss
scoring_elements 0.67495
published_at 2026-04-02T12:55:00Z
5
value 0.00537
scoring_system epss
scoring_elements 0.67516
published_at 2026-04-04T12:55:00Z
6
value 0.00537
scoring_system epss
scoring_elements 0.67494
published_at 2026-04-07T12:55:00Z
7
value 0.00537
scoring_system epss
scoring_elements 0.67545
published_at 2026-04-08T12:55:00Z
8
value 0.00537
scoring_system epss
scoring_elements 0.6756
published_at 2026-04-09T12:55:00Z
9
value 0.00537
scoring_system epss
scoring_elements 0.67583
published_at 2026-04-11T12:55:00Z
10
value 0.00537
scoring_system epss
scoring_elements 0.67569
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12425
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872540
reference_id 1872540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872540
3
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
6
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
7
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
8
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
9
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
10
reference_url https://usn.ubuntu.com/4408-1/
reference_id USN-4408-1
reference_type
scores
url https://usn.ubuntu.com/4408-1/
fixed_packages
aliases CVE-2020-12425
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p6nb-kyzu-bbdf
8
url VCID-ps9s-3kuv-1yh1
vulnerability_id VCID-ps9s-3kuv-1yh1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15677.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15677
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67111
published_at 2026-04-18T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67088
published_at 2026-04-09T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67108
published_at 2026-04-11T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67094
published_at 2026-04-12T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.67063
published_at 2026-04-13T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67096
published_at 2026-04-16T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.6699
published_at 2026-04-01T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67028
published_at 2026-04-02T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67052
published_at 2026-04-04T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67026
published_at 2026-04-07T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67076
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881664
reference_id 1881664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881664
8
reference_url https://security.archlinux.org/ASA-202009-10
reference_id ASA-202009-10
reference_type
scores
url https://security.archlinux.org/ASA-202009-10
9
reference_url https://security.archlinux.org/AVG-1235
reference_id AVG-1235
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1235
10
reference_url https://security.gentoo.org/glsa/202010-02
reference_id GLSA-202010-02
reference_type
scores
url https://security.gentoo.org/glsa/202010-02
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
reference_id mfsa2020-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
reference_id mfsa2020-43
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
reference_id mfsa2020-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
14
reference_url https://access.redhat.com/errata/RHSA-2020:3832
reference_id RHSA-2020:3832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3832
15
reference_url https://access.redhat.com/errata/RHSA-2020:3833
reference_id RHSA-2020:3833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3833
16
reference_url https://access.redhat.com/errata/RHSA-2020:3834
reference_id RHSA-2020:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3834
17
reference_url https://access.redhat.com/errata/RHSA-2020:3835
reference_id RHSA-2020:3835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3835
18
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
19
reference_url https://access.redhat.com/errata/RHSA-2020:4155
reference_id RHSA-2020:4155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4155
20
reference_url https://access.redhat.com/errata/RHSA-2020:4156
reference_id RHSA-2020:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4156
21
reference_url https://access.redhat.com/errata/RHSA-2020:4157
reference_id RHSA-2020:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4157
22
reference_url https://access.redhat.com/errata/RHSA-2020:4158
reference_id RHSA-2020:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4158
23
reference_url https://access.redhat.com/errata/RHSA-2020:4163
reference_id RHSA-2020:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4163
24
reference_url https://usn.ubuntu.com/4546-1/
reference_id USN-4546-1
reference_type
scores
url https://usn.ubuntu.com/4546-1/
fixed_packages
aliases CVE-2020-15677
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ps9s-3kuv-1yh1
9
url VCID-qhwf-9n5n-hbaa
vulnerability_id VCID-qhwf-9n5n-hbaa
summary
The code for downloading files did not properly take care of special characters,
which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15658
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.65647
published_at 2026-04-18T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65611
published_at 2026-04-08T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.65623
published_at 2026-04-09T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65642
published_at 2026-04-11T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65627
published_at 2026-04-12T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.65599
published_at 2026-04-13T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.65634
published_at 2026-04-16T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65513
published_at 2026-04-01T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65562
published_at 2026-04-02T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65592
published_at 2026-04-04T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.65558
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15658
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1861647
reference_id 1861647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1861647
4
reference_url https://security.archlinux.org/AVG-1213
reference_id AVG-1213
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1213
5
reference_url https://security.archlinux.org/AVG-1214
reference_id AVG-1214
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1214
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
reference_id mfsa2020-30
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-30
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
reference_id mfsa2020-32
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-32
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
reference_id mfsa2020-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-33
9
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
10
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
11
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
12
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
13
reference_url https://usn.ubuntu.com/4443-1/
reference_id USN-4443-1
reference_type
scores
url https://usn.ubuntu.com/4443-1/
fixed_packages
aliases CVE-2020-15658
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhwf-9n5n-hbaa
10
url VCID-w7rm-rw2c-wuas
vulnerability_id VCID-w7rm-rw2c-wuas
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15678.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15678
reference_id
reference_type
scores
0
value 0.00869
scoring_system epss
scoring_elements 0.7522
published_at 2026-04-18T12:55:00Z
1
value 0.00869
scoring_system epss
scoring_elements 0.75177
published_at 2026-04-13T12:55:00Z
2
value 0.00869
scoring_system epss
scoring_elements 0.75189
published_at 2026-04-09T12:55:00Z
3
value 0.00869
scoring_system epss
scoring_elements 0.75211
published_at 2026-04-11T12:55:00Z
4
value 0.00869
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-12T12:55:00Z
5
value 0.00869
scoring_system epss
scoring_elements 0.75214
published_at 2026-04-16T12:55:00Z
6
value 0.00869
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-01T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-02T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.75166
published_at 2026-04-04T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75143
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1881666
reference_id 1881666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1881666
8
reference_url https://security.archlinux.org/ASA-202009-10
reference_id ASA-202009-10
reference_type
scores
url https://security.archlinux.org/ASA-202009-10
9
reference_url https://security.archlinux.org/AVG-1235
reference_id AVG-1235
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1235
10
reference_url https://security.gentoo.org/glsa/202010-02
reference_id GLSA-202010-02
reference_type
scores
url https://security.gentoo.org/glsa/202010-02
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
reference_id mfsa2020-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-42
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
reference_id mfsa2020-43
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-43
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
reference_id mfsa2020-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-44
14
reference_url https://access.redhat.com/errata/RHSA-2020:3832
reference_id RHSA-2020:3832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3832
15
reference_url https://access.redhat.com/errata/RHSA-2020:3833
reference_id RHSA-2020:3833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3833
16
reference_url https://access.redhat.com/errata/RHSA-2020:3834
reference_id RHSA-2020:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3834
17
reference_url https://access.redhat.com/errata/RHSA-2020:3835
reference_id RHSA-2020:3835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3835
18
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
19
reference_url https://access.redhat.com/errata/RHSA-2020:4155
reference_id RHSA-2020:4155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4155
20
reference_url https://access.redhat.com/errata/RHSA-2020:4156
reference_id RHSA-2020:4156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4156
21
reference_url https://access.redhat.com/errata/RHSA-2020:4157
reference_id RHSA-2020:4157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4157
22
reference_url https://access.redhat.com/errata/RHSA-2020:4158
reference_id RHSA-2020:4158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4158
23
reference_url https://access.redhat.com/errata/RHSA-2020:4163
reference_id RHSA-2020:4163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4163
24
reference_url https://usn.ubuntu.com/4546-1/
reference_id USN-4546-1
reference_type
scores
url https://usn.ubuntu.com/4546-1/
fixed_packages
aliases CVE-2020-15678
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7rm-rw2c-wuas
11
url VCID-w9xm-y9fr-wyh7
vulnerability_id VCID-w9xm-y9fr-wyh7
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12422.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12422
reference_id
reference_type
scores
0
value 0.00616
scoring_system epss
scoring_elements 0.69961
published_at 2026-04-18T12:55:00Z
1
value 0.00616
scoring_system epss
scoring_elements 0.69908
published_at 2026-04-13T12:55:00Z
2
value 0.00616
scoring_system epss
scoring_elements 0.69951
published_at 2026-04-16T12:55:00Z
3
value 0.00616
scoring_system epss
scoring_elements 0.69845
published_at 2026-04-01T12:55:00Z
4
value 0.00616
scoring_system epss
scoring_elements 0.69858
published_at 2026-04-02T12:55:00Z
5
value 0.00616
scoring_system epss
scoring_elements 0.69873
published_at 2026-04-04T12:55:00Z
6
value 0.00616
scoring_system epss
scoring_elements 0.6985
published_at 2026-04-07T12:55:00Z
7
value 0.00616
scoring_system epss
scoring_elements 0.69898
published_at 2026-04-08T12:55:00Z
8
value 0.00616
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-09T12:55:00Z
9
value 0.00616
scoring_system epss
scoring_elements 0.69938
published_at 2026-04-11T12:55:00Z
10
value 0.00616
scoring_system epss
scoring_elements 0.69922
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12422
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872538
reference_id 1872538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872538
3
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
6
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
7
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
8
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
9
reference_url https://access.redhat.com/errata/RHSA-2020:4080
reference_id RHSA-2020:4080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4080
10
reference_url https://usn.ubuntu.com/4408-1/
reference_id USN-4408-1
reference_type
scores
url https://usn.ubuntu.com/4408-1/
fixed_packages
aliases CVE-2020-12422
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9xm-y9fr-wyh7
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@78.3.0-1%3Farch=el7_9