Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nss-softokn@3.53.1-6?arch=el7_9
Typerpm
Namespaceredhat
Namenss-softokn
Version3.53.1-6
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6fvj-phnx-kfgs
vulnerability_id VCID-6fvj-phnx-kfgs
summary After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75599
published_at 2026-04-01T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-12T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.75657
published_at 2026-04-13T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-11T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-02T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-04T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-07T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.75646
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
reference_id 1791225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
7
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
8
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
14
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
fixed_packages
aliases CVE-2019-17023
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fvj-phnx-kfgs
1
url VCID-7msj-wyd6-zkbe
vulnerability_id VCID-7msj-wyd6-zkbe
summary nss: Check length of inputs for cryptographic primitives
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17006.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
reference_id
reference_type
scores
0
value 0.03036
scoring_system epss
scoring_elements 0.86605
published_at 2026-04-01T12:55:00Z
1
value 0.03036
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-02T12:55:00Z
2
value 0.03036
scoring_system epss
scoring_elements 0.86636
published_at 2026-04-04T12:55:00Z
3
value 0.03036
scoring_system epss
scoring_elements 0.86635
published_at 2026-04-07T12:55:00Z
4
value 0.03036
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-08T12:55:00Z
5
value 0.03036
scoring_system epss
scoring_elements 0.86664
published_at 2026-04-09T12:55:00Z
6
value 0.03036
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-11T12:55:00Z
7
value 0.03036
scoring_system epss
scoring_elements 0.86675
published_at 2026-04-12T12:55:00Z
8
value 0.03036
scoring_system epss
scoring_elements 0.86668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17006
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
reference_id 1775916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1775916
8
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
9
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
10
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
11
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
14
reference_url https://usn.ubuntu.com/4231-1/
reference_id USN-4231-1
reference_type
scores
url https://usn.ubuntu.com/4231-1/
fixed_packages
aliases CVE-2019-17006
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7msj-wyd6-zkbe
2
url VCID-8qtg-h4km-bfg2
vulnerability_id VCID-8qtg-h4km-bfg2
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.6355
published_at 2026-04-11T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63534
published_at 2026-04-12T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.63517
published_at 2026-04-08T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63413
published_at 2026-04-01T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-07T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63473
published_at 2026-04-02T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.635
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
reference_id 1728436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728436
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://security.gentoo.org/glsa/201908-20
reference_id GLSA-201908-20
reference_type
scores
url https://security.gentoo.org/glsa/201908-20
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
reference_id mfsa2019-22
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-22
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
reference_id mfsa2019-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-23
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
13
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
14
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
15
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
16
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
17
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
18
reference_url https://usn.ubuntu.com/4060-2/
reference_id USN-4060-2
reference_type
scores
url https://usn.ubuntu.com/4060-2/
19
reference_url https://usn.ubuntu.com/4064-1/
reference_id USN-4064-1
reference_type
scores
url https://usn.ubuntu.com/4064-1/
fixed_packages
aliases CVE-2019-11719
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8qtg-h4km-bfg2
3
url VCID-k4a4-f1as-x3bj
vulnerability_id VCID-k4a4-f1as-x3bj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-13T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-11T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.34934
published_at 2026-04-01T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35132
published_at 2026-04-02T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35161
published_at 2026-04-04T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.3504
published_at 2026-04-07T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35085
published_at 2026-04-08T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35111
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
reference_id 1853983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1853983
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
aliases CVE-2020-12400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj
4
url VCID-mx8t-s47w-wud5
vulnerability_id VCID-mx8t-s47w-wud5
summary When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.69005
published_at 2026-04-13T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.69049
published_at 2026-04-11T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.69034
published_at 2026-04-12T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.6894
published_at 2026-04-01T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.68958
published_at 2026-04-02T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.68978
published_at 2026-04-04T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.68957
published_at 2026-04-07T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-08T12:55:00Z
8
value 0.00584
scoring_system epss
scoring_elements 0.69027
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
reference_id 1826187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826187
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
6
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
7
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
10
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
aliases CVE-2020-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5
5
url VCID-n6s1-tsx2-7fee
vulnerability_id VCID-n6s1-tsx2-7fee
summary Improper refcounting of soft token session objects could cause a use-after-free and crash (likely limited to a denial of service).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11756.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11756
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48895
published_at 2026-04-01T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48962
published_at 2026-04-13T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.4898
published_at 2026-04-11T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48955
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48932
published_at 2026-04-02T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48958
published_at 2026-04-04T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48912
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48966
published_at 2026-04-08T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48963
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11756
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774835
reference_id 1774835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774835
3
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
4
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
6
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
9
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
10
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
11
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
12
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
13
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
fixed_packages
aliases CVE-2019-11756
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n6s1-tsx2-7fee
6
url VCID-rk7t-zjzg-eqar
vulnerability_id VCID-rk7t-zjzg-eqar
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40566
published_at 2026-04-13T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40604
published_at 2026-04-09T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40585
published_at 2026-04-12T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40514
published_at 2026-04-01T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40595
published_at 2026-04-08T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40622
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40544
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
reference_id 1851294
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1851294
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
8
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://usn.ubuntu.com/4455-1/
reference_id USN-4455-1
reference_type
scores
url https://usn.ubuntu.com/4455-1/
11
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
aliases CVE-2020-12401
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar
7
url VCID-szzk-wxm2-cfgj
vulnerability_id VCID-szzk-wxm2-cfgj
summary
NSS has multiple information disclosure vulnerabilities when
    handling secret key material.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-01T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70344
published_at 2026-04-02T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70361
published_at 2026-04-04T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70339
published_at 2026-04-07T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70385
published_at 2026-04-08T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.704
published_at 2026-04-09T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-11T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70408
published_at 2026-04-12T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70394
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12403
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
reference_id 1868931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868931
4
reference_url https://security.gentoo.org/glsa/202008-08
reference_id GLSA-202008-08
reference_type
scores
url https://security.gentoo.org/glsa/202008-08
5
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
6
reference_url https://access.redhat.com/errata/RHSA-2021:0538
reference_id RHSA-2021:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0538
7
reference_url https://access.redhat.com/errata/RHSA-2021:0758
reference_id RHSA-2021:0758
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0758
8
reference_url https://access.redhat.com/errata/RHSA-2021:0876
reference_id RHSA-2021:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0876
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:1026
reference_id RHSA-2021:1026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1026
11
reference_url https://usn.ubuntu.com/4476-1/
reference_id USN-4476-1
reference_type
scores
url https://usn.ubuntu.com/4476-1/
fixed_packages
aliases CVE-2020-12403
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szzk-wxm2-cfgj
8
url VCID-vjas-pry4-93cz
vulnerability_id VCID-vjas-pry4-93cz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28029
published_at 2026-04-13T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28122
published_at 2026-04-09T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28129
published_at 2026-04-11T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28086
published_at 2026-04-12T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28102
published_at 2026-04-01T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28174
published_at 2026-04-02T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28218
published_at 2026-04-04T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28012
published_at 2026-04-07T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28079
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12402
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
reference_id 1826231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1826231
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
reference_id 963152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963152
9
reference_url https://security.gentoo.org/glsa/202007-10
reference_id GLSA-202007-10
reference_type
scores
url https://security.gentoo.org/glsa/202007-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
reference_id mfsa2020-24
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-24
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
reference_id mfsa2020-29
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-29
12
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
13
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
14
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
15
reference_url https://usn.ubuntu.com/4417-1/
reference_id USN-4417-1
reference_type
scores
url https://usn.ubuntu.com/4417-1/
16
reference_url https://usn.ubuntu.com/4417-2/
reference_id USN-4417-2
reference_type
scores
url https://usn.ubuntu.com/4417-2/
fixed_packages
aliases CVE-2020-12402
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjas-pry4-93cz
9
url VCID-wavp-f4kn-j3cm
vulnerability_id VCID-wavp-f4kn-j3cm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
reference_id
reference_type
scores
0
value 0.00248
scoring_system epss
scoring_elements 0.48111
published_at 2026-04-13T12:55:00Z
1
value 0.00248
scoring_system epss
scoring_elements 0.48106
published_at 2026-04-08T12:55:00Z
2
value 0.00248
scoring_system epss
scoring_elements 0.48101
published_at 2026-04-09T12:55:00Z
3
value 0.00248
scoring_system epss
scoring_elements 0.48124
published_at 2026-04-11T12:55:00Z
4
value 0.00248
scoring_system epss
scoring_elements 0.481
published_at 2026-04-12T12:55:00Z
5
value 0.00248
scoring_system epss
scoring_elements 0.48045
published_at 2026-04-01T12:55:00Z
6
value 0.00248
scoring_system epss
scoring_elements 0.48082
published_at 2026-04-02T12:55:00Z
7
value 0.00248
scoring_system epss
scoring_elements 0.48103
published_at 2026-04-04T12:55:00Z
8
value 0.00248
scoring_system epss
scoring_elements 0.48053
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
reference_id 1730988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1730988
5
reference_url https://security.archlinux.org/ASA-201907-4
reference_id ASA-201907-4
reference_type
scores
url https://security.archlinux.org/ASA-201907-4
6
reference_url https://security.archlinux.org/AVG-1002
reference_id AVG-1002
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1002
7
reference_url https://security.gentoo.org/glsa/201908-12
reference_id GLSA-201908-12
reference_type
scores
url https://security.gentoo.org/glsa/201908-12
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
reference_id mfsa2019-21
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-21
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
reference_id mfsa2019-28
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-28
10
reference_url https://access.redhat.com/errata/RHSA-2019:1951
reference_id RHSA-2019:1951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1951
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4054-1/
reference_id USN-4054-1
reference_type
scores
url https://usn.ubuntu.com/4054-1/
14
reference_url https://usn.ubuntu.com/4060-1/
reference_id USN-4060-1
reference_type
scores
url https://usn.ubuntu.com/4060-1/
fixed_packages
aliases CVE-2019-11727
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wavp-f4kn-j3cm
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nss-softokn@3.53.1-6%3Farch=el7_9