Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/387246?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "type": "apk", "namespace": "alpine", "name": "librewolf", "version": "84.0.1-r0", "qualifiers": { "arch": "loongarch64", "distroversion": "edge", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "84.0.2-r0", "latest_non_vulnerable_version": "119.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60463?format=api", "vulnerability_id": "VCID-38j9-cugr-abc9", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67505", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67491", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67457", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67493", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67379", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00535", "scoring_system": "epss", "scoring_elements": "0.67416", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908029", "reference_id": "1908029", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908029" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-35113" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38j9-cugr-abc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60462?format=api", "vulnerability_id": "VCID-3yea-3gw6-xkcb", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54888", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5488", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54877", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54889", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54848", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54886", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54766", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54837", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5483", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908027", "reference_id": "1908027", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908027" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-35111" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3yea-3gw6-xkcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60457?format=api", "vulnerability_id": "VCID-5pf4-9k7e-hbee", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60493", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60464", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60424", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904515", "reference_id": "1904515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904515" }, { "reference_url": "https://security.archlinux.org/ASA-202012-14", "reference_id": "ASA-202012-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-14" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1323", "reference_id": "AVG-1323", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1323" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-05", "reference_id": "GLSA-202012-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-05" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-16042" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5pf4-9k7e-hbee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60460?format=api", "vulnerability_id": "VCID-5utj-ddpa-17gq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.734", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.7334", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73356", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73392", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73298", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00761", "scoring_system": "epss", "scoring_elements": "0.73303", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908024", "reference_id": "1908024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908024" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26974" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5utj-ddpa-17gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63109?format=api", "vulnerability_id": "VCID-63zq-gzan-8yff", "summary": "The lifecycle of IPC Actors allows managed actors to outlive their manager actors; and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26972", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66668", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66747", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.6677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.6679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00518", "scoring_system": "epss", "scoring_elements": "0.66776", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26972" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26972" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63zq-gzan-8yff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60461?format=api", "vulnerability_id": "VCID-7krh-czjm-4ufx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.6207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62107", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62097", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62119", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.61949", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.6202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00422", "scoring_system": "epss", "scoring_elements": "0.62051", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908025", "reference_id": "1908025", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908025" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26978" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7krh-czjm-4ufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63114?format=api", "vulnerability_id": "VCID-ccev-4z5c-u3hj", "summary": "Mozilla developers Christian Holler, Jan-Ivar Bruaroey, and Gabriele Svelto reported memory safety bugs present in Firefox 83. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62865", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62714", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.6284", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62857", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62771", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62765", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62817", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62834", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62852", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35114" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-35114" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ccev-4z5c-u3hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63110?format=api", "vulnerability_id": "VCID-hs7f-4tav-dfcv", "summary": "When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5948", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.5933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59473", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59403", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59443", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00379", "scoring_system": "epss", "scoring_elements": "0.59459", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26975" }, { "reference_url": "https://security.archlinux.org/AVG-1363", "reference_id": "AVG-1363", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1363" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26975" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hs7f-4tav-dfcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60459?format=api", "vulnerability_id": "VCID-jyur-q447-t7hr", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55626", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55602", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.55583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00326", "scoring_system": "epss", "scoring_elements": "0.5556", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908023", "reference_id": "1908023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908023" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26973" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyur-q447-t7hr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63113?format=api", "vulnerability_id": "VCID-m92a-91pv-dffv", "summary": "If a user downloaded a file lacking an extension on Windows, and then \"Open\"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.6735", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67331", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67303", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00532", "scoring_system": "epss", "scoring_elements": "0.67289", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35112" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908028", "reference_id": "1908028", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908028" }, { "reference_url": "https://security.archlinux.org/AVG-1364", "reference_id": "AVG-1364", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1364" }, { "reference_url": "https://security.archlinux.org/AVG-1366", "reference_id": "AVG-1366", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1366" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-35112" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m92a-91pv-dffv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36560?format=api", "vulnerability_id": "VCID-nzcd-dk9q-puh1", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26976", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83582", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83533", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83542", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83481", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01973", "scoring_system": "epss", "scoring_elements": "0.83508", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920649", "reference_id": "1920649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920649" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/ASA-202102-2", "reference_id": "ASA-202102-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-2" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.archlinux.org/AVG-1496", "reference_id": "AVG-1496", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1496" }, { "reference_url": "https://security.gentoo.org/glsa/202102-02", "reference_id": "GLSA-202102-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202102-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-04", "reference_id": "mfsa2021-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-05", "reference_id": "mfsa2021-05", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0285", "reference_id": "RHSA-2021:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0288", "reference_id": "RHSA-2021:0288", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0288" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0289", "reference_id": "RHSA-2021:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0290", "reference_id": "RHSA-2021:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0297", "reference_id": "RHSA-2021:0297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0298", "reference_id": "RHSA-2021:0298", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0298" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0299", "reference_id": "RHSA-2021:0299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0397", "reference_id": "RHSA-2021:0397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0397" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4736-1/", "reference_id": "USN-4736-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4736-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26976" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nzcd-dk9q-puh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63111?format=api", "vulnerability_id": "VCID-t52g-d7e2-zkd4", "summary": "By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26977", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59694", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59653", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59611", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.5967", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59672", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26977" }, { "reference_url": "https://security.archlinux.org/AVG-1363", "reference_id": "AVG-1363", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1363" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26977" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t52g-d7e2-zkd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60458?format=api", "vulnerability_id": "VCID-v5vy-j784-r3bj", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77654", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77636", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77674", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0106", "scoring_system": "epss", "scoring_elements": "0.77593", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908022", "reference_id": "1908022", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908022" }, { "reference_url": "https://security.archlinux.org/ASA-202012-23", "reference_id": "ASA-202012-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-23" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1315", "reference_id": "AVG-1315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1315" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://security.gentoo.org/glsa/202012-20", "reference_id": "GLSA-202012-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55", "reference_id": "mfsa2020-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56", "reference_id": "mfsa2020-56", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5561", "reference_id": "RHSA-2020:5561", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5561" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5562", "reference_id": "RHSA-2020:5562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5563", "reference_id": "RHSA-2020:5563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5564", "reference_id": "RHSA-2020:5564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5565", "reference_id": "RHSA-2020:5565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5618", "reference_id": "RHSA-2020:5618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5622", "reference_id": "RHSA-2020:5622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5624", "reference_id": "RHSA-2020:5624", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5644", "reference_id": "RHSA-2020:5644", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5645", "reference_id": "RHSA-2020:5645", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5645" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" }, { "reference_url": "https://usn.ubuntu.com/4701-1/", "reference_id": "USN-4701-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4701-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26971" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v5vy-j784-r3bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63112?format=api", "vulnerability_id": "VCID-z1a8-kgzw-vygg", "summary": "When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26979", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48441", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48409", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48391", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48385", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26979" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202012-25", "reference_id": "ASA-202012-25", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-25" }, { "reference_url": "https://security.archlinux.org/AVG-1362", "reference_id": "AVG-1362", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1362" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54", "reference_id": "mfsa2020-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-54" }, { "reference_url": "https://usn.ubuntu.com/4671-1/", "reference_id": "USN-4671-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4671-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/387246?format=api", "purl": "pkg:apk/alpine/librewolf@84.0.1-r0?arch=loongarch64&distroversion=edge&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" } ], "aliases": [ "CVE-2020-26979" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a8-kgzw-vygg" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@84.0.1-r0%3Farch=loongarch64&distroversion=edge&reponame=community" }