Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/firefox@72.0.2-1
Typealpm
Namespacearchlinux
Namefirefox
Version72.0.2-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version73.0-1
Latest_non_vulnerable_version101.0-1
Affected_by_vulnerabilities
0
url VCID-2sd2-88zt-kkaq
vulnerability_id VCID-2sd2-88zt-kkaq
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6796
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-18T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-12T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75154
published_at 2026-04-21T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-13T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75158
published_at 2026-04-16T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.75077
published_at 2026-04-01T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75079
published_at 2026-04-02T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75109
published_at 2026-04-04T12:55:00Z
8
value 0.00866
scoring_system epss
scoring_elements 0.75085
published_at 2026-04-07T12:55:00Z
9
value 0.00866
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801916
reference_id 1801916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801916
7
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
8
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
9
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
12
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
13
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
14
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
15
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
16
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
17
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
fixed_packages
0
url pkg:alpm/archlinux/firefox@73.0-1
purl pkg:alpm/archlinux/firefox@73.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@73.0-1
aliases CVE-2020-6796
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sd2-88zt-kkaq
1
url VCID-h6mx-yu5m-uygt
vulnerability_id VCID-h6mx-yu5m-uygt
summary Mozilla developers Jason Kratzer, Tyson Smith, and Christian Holler reported memory safety bugs present in Firefox 72. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6801.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6801
reference_id
reference_type
scores
0
value 0.00576
scoring_system epss
scoring_elements 0.68723
published_at 2026-04-01T12:55:00Z
1
value 0.00576
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-18T12:55:00Z
2
value 0.00576
scoring_system epss
scoring_elements 0.6879
published_at 2026-04-13T12:55:00Z
3
value 0.00576
scoring_system epss
scoring_elements 0.68831
published_at 2026-04-16T12:55:00Z
4
value 0.00576
scoring_system epss
scoring_elements 0.68742
published_at 2026-04-02T12:55:00Z
5
value 0.00576
scoring_system epss
scoring_elements 0.68763
published_at 2026-04-04T12:55:00Z
6
value 0.00576
scoring_system epss
scoring_elements 0.68741
published_at 2026-04-07T12:55:00Z
7
value 0.00576
scoring_system epss
scoring_elements 0.68792
published_at 2026-04-08T12:55:00Z
8
value 0.00576
scoring_system epss
scoring_elements 0.68812
published_at 2026-04-09T12:55:00Z
9
value 0.00576
scoring_system epss
scoring_elements 0.68834
published_at 2026-04-11T12:55:00Z
10
value 0.00576
scoring_system epss
scoring_elements 0.6882
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6801
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1829100
reference_id 1829100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1829100
3
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
4
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
6
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
7
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
fixed_packages
0
url pkg:alpm/archlinux/firefox@73.0-1
purl pkg:alpm/archlinux/firefox@73.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@73.0-1
aliases CVE-2020-6801
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6mx-yu5m-uygt
2
url VCID-rszh-1c16-47ah
vulnerability_id VCID-rszh-1c16-47ah
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
reference_id
reference_type
scores
0
value 0.01646
scoring_system epss
scoring_elements 0.8201
published_at 2026-04-21T12:55:00Z
1
value 0.01646
scoring_system epss
scoring_elements 0.81962
published_at 2026-04-08T12:55:00Z
2
value 0.01646
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-09T12:55:00Z
3
value 0.01646
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-11T12:55:00Z
4
value 0.01646
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-12T12:55:00Z
5
value 0.01646
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-13T12:55:00Z
6
value 0.01646
scoring_system epss
scoring_elements 0.82008
published_at 2026-04-18T12:55:00Z
7
value 0.01646
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-01T12:55:00Z
8
value 0.01646
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-02T12:55:00Z
9
value 0.01646
scoring_system epss
scoring_elements 0.81939
published_at 2026-04-04T12:55:00Z
10
value 0.01646
scoring_system epss
scoring_elements 0.81935
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
reference_id 1801918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@73.0-1
purl pkg:alpm/archlinux/firefox@73.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@73.0-1
aliases CVE-2020-6798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah
3
url VCID-y8vr-48q8-a3aj
vulnerability_id VCID-y8vr-48q8-a3aj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
reference_id
reference_type
scores
0
value 0.0125
scoring_system epss
scoring_elements 0.79354
published_at 2026-04-21T12:55:00Z
1
value 0.0125
scoring_system epss
scoring_elements 0.79323
published_at 2026-04-08T12:55:00Z
2
value 0.0125
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-09T12:55:00Z
3
value 0.0125
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-16T12:55:00Z
4
value 0.0125
scoring_system epss
scoring_elements 0.79341
published_at 2026-04-12T12:55:00Z
5
value 0.0125
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-13T12:55:00Z
6
value 0.0125
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-18T12:55:00Z
7
value 0.0125
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-01T12:55:00Z
8
value 0.0125
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-02T12:55:00Z
9
value 0.0125
scoring_system epss
scoring_elements 0.79312
published_at 2026-04-04T12:55:00Z
10
value 0.0125
scoring_system epss
scoring_elements 0.79298
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
reference_id 1801920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:alpm/archlinux/firefox@73.0-1
purl pkg:alpm/archlinux/firefox@73.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@73.0-1
aliases CVE-2020-6800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@72.0.2-1