Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version83.0-r0
Qualifiers
arch x86_64
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version84.0.1-r0
Latest_non_vulnerable_version101.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1frd-d76n-13fm
vulnerability_id VCID-1frd-d76n-13fm
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26965.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26965
reference_id
reference_type
scores
0
value 0.00444
scoring_system epss
scoring_elements 0.63421
published_at 2026-04-16T12:55:00Z
1
value 0.00444
scoring_system epss
scoring_elements 0.63352
published_at 2026-04-07T12:55:00Z
2
value 0.00444
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-08T12:55:00Z
3
value 0.00444
scoring_system epss
scoring_elements 0.63422
published_at 2026-04-12T12:55:00Z
4
value 0.00444
scoring_system epss
scoring_elements 0.63439
published_at 2026-04-11T12:55:00Z
5
value 0.00444
scoring_system epss
scoring_elements 0.63386
published_at 2026-04-13T12:55:00Z
6
value 0.00444
scoring_system epss
scoring_elements 0.633
published_at 2026-04-01T12:55:00Z
7
value 0.00444
scoring_system epss
scoring_elements 0.6336
published_at 2026-04-02T12:55:00Z
8
value 0.00444
scoring_system epss
scoring_elements 0.63387
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898739
reference_id 1898739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898739
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26965
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1frd-d76n-13fm
1
url VCID-436x-mrs7-q3gk
vulnerability_id VCID-436x-mrs7-q3gk
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26960.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26960
reference_id
reference_type
scores
0
value 0.00665
scoring_system epss
scoring_elements 0.71264
published_at 2026-04-16T12:55:00Z
1
value 0.00665
scoring_system epss
scoring_elements 0.71212
published_at 2026-04-08T12:55:00Z
2
value 0.00665
scoring_system epss
scoring_elements 0.71226
published_at 2026-04-09T12:55:00Z
3
value 0.00665
scoring_system epss
scoring_elements 0.71248
published_at 2026-04-11T12:55:00Z
4
value 0.00665
scoring_system epss
scoring_elements 0.71233
published_at 2026-04-12T12:55:00Z
5
value 0.00665
scoring_system epss
scoring_elements 0.71217
published_at 2026-04-13T12:55:00Z
6
value 0.00665
scoring_system epss
scoring_elements 0.71168
published_at 2026-04-01T12:55:00Z
7
value 0.00665
scoring_system epss
scoring_elements 0.71177
published_at 2026-04-02T12:55:00Z
8
value 0.00665
scoring_system epss
scoring_elements 0.71195
published_at 2026-04-04T12:55:00Z
9
value 0.00665
scoring_system epss
scoring_elements 0.7117
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898737
reference_id 1898737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898737
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26960
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-436x-mrs7-q3gk
2
url VCID-7ej3-csq2-9ycp
vulnerability_id VCID-7ej3-csq2-9ycp
summary When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26955
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51852
published_at 2026-04-16T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51707
published_at 2026-04-01T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51756
published_at 2026-04-02T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51782
published_at 2026-04-04T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51742
published_at 2026-04-07T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51797
published_at 2026-04-08T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51794
published_at 2026-04-09T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51845
published_at 2026-04-11T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-12T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26955
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26955
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ej3-csq2-9ycp
3
url VCID-83xt-ng2x-zugv
vulnerability_id VCID-83xt-ng2x-zugv
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26953.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26953
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46169
published_at 2026-04-16T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46109
published_at 2026-04-08T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46107
published_at 2026-04-09T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46131
published_at 2026-04-11T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46102
published_at 2026-04-12T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46111
published_at 2026-04-13T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46045
published_at 2026-04-01T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46084
published_at 2026-04-02T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46106
published_at 2026-04-04T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46053
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898733
reference_id 1898733
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898733
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26953
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83xt-ng2x-zugv
4
url VCID-8jzn-g96u-tudw
vulnerability_id VCID-8jzn-g96u-tudw
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26956.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26956
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62753
published_at 2026-04-16T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-08T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62729
published_at 2026-04-09T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62748
published_at 2026-04-11T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62737
published_at 2026-04-12T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62714
published_at 2026-04-13T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62606
published_at 2026-04-01T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62664
published_at 2026-04-02T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62696
published_at 2026-04-04T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.62661
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898734
reference_id 1898734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898734
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26956
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8jzn-g96u-tudw
5
url VCID-8tmx-53k3-pbfj
vulnerability_id VCID-8tmx-53k3-pbfj
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26961.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26961.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26961
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50986
published_at 2026-04-13T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50926
published_at 2026-04-07T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50983
published_at 2026-04-08T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50981
published_at 2026-04-09T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.51023
published_at 2026-04-16T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.51002
published_at 2026-04-12T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.5089
published_at 2026-04-01T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.50943
published_at 2026-04-02T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.50968
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26961
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898738
reference_id 1898738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898738
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26961
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tmx-53k3-pbfj
6
url VCID-a66n-msy9-d3f9
vulnerability_id VCID-a66n-msy9-d3f9
summary Mozilla developers Tyson Smith, Aaron Klotz, David Major and Jason Kratzer reported memory safety bugs present in Firefox 82. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26969
reference_id
reference_type
scores
0
value 0.00774
scoring_system epss
scoring_elements 0.73625
published_at 2026-04-16T12:55:00Z
1
value 0.00774
scoring_system epss
scoring_elements 0.73532
published_at 2026-04-01T12:55:00Z
2
value 0.00774
scoring_system epss
scoring_elements 0.73608
published_at 2026-04-11T12:55:00Z
3
value 0.00774
scoring_system epss
scoring_elements 0.7359
published_at 2026-04-12T12:55:00Z
4
value 0.00774
scoring_system epss
scoring_elements 0.73582
published_at 2026-04-13T12:55:00Z
5
value 0.00774
scoring_system epss
scoring_elements 0.73541
published_at 2026-04-02T12:55:00Z
6
value 0.00774
scoring_system epss
scoring_elements 0.73563
published_at 2026-04-04T12:55:00Z
7
value 0.00774
scoring_system epss
scoring_elements 0.73535
published_at 2026-04-07T12:55:00Z
8
value 0.00774
scoring_system epss
scoring_elements 0.73571
published_at 2026-04-08T12:55:00Z
9
value 0.00774
scoring_system epss
scoring_elements 0.73585
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26969
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
3
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
5
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
6
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26969
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a66n-msy9-d3f9
7
url VCID-cver-m3d6-rkhp
vulnerability_id VCID-cver-m3d6-rkhp
summary If the Remote Debugging via USB feature was enabled in Firefox for Android on an Android version prior to Android 6.0, untrusted apps could have connected to the feature and operated with the privileges of the browser to read and interact with web content. The feature was implemented as a unix domain socket, protected by the Android SELinux policy; however, SELinux was not enforced for versions prior to 6.0. This was fixed by removing the Remote Debugging via USB feature from affected devices.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26964
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53204
published_at 2026-04-16T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.5309
published_at 2026-04-01T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.5311
published_at 2026-04-02T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53133
published_at 2026-04-04T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53101
published_at 2026-04-07T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53152
published_at 2026-04-08T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53145
published_at 2026-04-09T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53196
published_at 2026-04-11T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53181
published_at 2026-04-12T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53165
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26964
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26964
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cver-m3d6-rkhp
8
url VCID-dsaw-xa6k-4yfw
vulnerability_id VCID-dsaw-xa6k-4yfw
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26968.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26968
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70438
published_at 2026-04-16T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70386
published_at 2026-04-08T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70401
published_at 2026-04-09T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70425
published_at 2026-04-11T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.7041
published_at 2026-04-12T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70396
published_at 2026-04-13T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70333
published_at 2026-04-01T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.70345
published_at 2026-04-02T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70362
published_at 2026-04-04T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.70341
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898741
reference_id 1898741
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898741
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26968
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsaw-xa6k-4yfw
9
url VCID-ervb-z282-7kdy
vulnerability_id VCID-ervb-z282-7kdy
summary When listening for page changes with a Mutation Observer, a malicious web page could confuse Firefox Screenshots into interacting with elements other than those that it injected into the page. This would lead to internal errors and unexpected behavior in the Screenshots code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26967
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51852
published_at 2026-04-16T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51707
published_at 2026-04-01T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51845
published_at 2026-04-11T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-12T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51809
published_at 2026-04-13T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51756
published_at 2026-04-02T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51782
published_at 2026-04-04T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51742
published_at 2026-04-07T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51797
published_at 2026-04-08T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51794
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26967
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
3
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
5
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
6
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26967
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ervb-z282-7kdy
10
url VCID-f3ws-d8fh-9ucz
vulnerability_id VCID-f3ws-d8fh-9ucz
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26959.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26959
reference_id
reference_type
scores
0
value 0.00495
scoring_system epss
scoring_elements 0.65806
published_at 2026-04-16T12:55:00Z
1
value 0.00495
scoring_system epss
scoring_elements 0.65785
published_at 2026-04-08T12:55:00Z
2
value 0.00495
scoring_system epss
scoring_elements 0.65795
published_at 2026-04-09T12:55:00Z
3
value 0.00495
scoring_system epss
scoring_elements 0.65816
published_at 2026-04-11T12:55:00Z
4
value 0.00495
scoring_system epss
scoring_elements 0.65802
published_at 2026-04-12T12:55:00Z
5
value 0.00495
scoring_system epss
scoring_elements 0.65772
published_at 2026-04-13T12:55:00Z
6
value 0.00495
scoring_system epss
scoring_elements 0.65687
published_at 2026-04-01T12:55:00Z
7
value 0.00495
scoring_system epss
scoring_elements 0.65737
published_at 2026-04-02T12:55:00Z
8
value 0.00495
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-04T12:55:00Z
9
value 0.00495
scoring_system epss
scoring_elements 0.65732
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26959
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898736
reference_id 1898736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898736
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26959
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f3ws-d8fh-9ucz
11
url VCID-nx21-ks3v-53e4
vulnerability_id VCID-nx21-ks3v-53e4
summary
Heap buffer overflow in CefSharp
### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.

> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ 

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

### Patches
Upgrade to 85.3.130 or higher

### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942

To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
reference_id
reference_type
scores
0
value 0.92905
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-16T12:55:00Z
1
value 0.92905
scoring_system epss
scoring_elements 0.99771
published_at 2026-04-12T12:55:00Z
2
value 0.92931
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-04T12:55:00Z
3
value 0.92931
scoring_system epss
scoring_elements 0.99774
published_at 2026-04-08T12:55:00Z
4
value 0.92931
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
3
reference_url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
4
reference_url https://crbug.com/1139963
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://crbug.com/1139963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
145
reference_url http://seclists.org/fulldisclosure/2020/Nov/33
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://seclists.org/fulldisclosure/2020/Nov/33
146
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
147
reference_url https://github.com/cefsharp/CefSharp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp
148
reference_url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
149
reference_url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
152
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
153
reference_url https://security.gentoo.org/glsa/202011-12
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202011-12
154
reference_url https://security.gentoo.org/glsa/202012-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202012-04
155
reference_url https://security.gentoo.org/glsa/202401-19
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202401-19
156
reference_url https://security.netapp.com/advisory/ntap-20240812-0001
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240812-0001
157
reference_url https://www.debian.org/security/2021/dsa-4824
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://www.debian.org/security/2021/dsa-4824
158
reference_url https://www.nuget.org/packages/CefSharp.Common
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Common
159
reference_url https://www.nuget.org/packages/CefSharp.WinForms
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.WinForms
160
reference_url https://www.nuget.org/packages/CefSharp.Wpf
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf
161
reference_url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
162
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
reference_id 1890210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
163
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
reference_id 972586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
164
reference_url https://security.archlinux.org/ASA-202010-10
reference_id ASA-202010-10
reference_type
scores
url https://security.archlinux.org/ASA-202010-10
165
reference_url https://security.archlinux.org/ASA-202010-11
reference_id ASA-202010-11
reference_type
scores
url https://security.archlinux.org/ASA-202010-11
166
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
167
reference_url https://security.archlinux.org/AVG-1254
reference_id AVG-1254
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1254
168
reference_url https://security.archlinux.org/AVG-1255
reference_id AVG-1255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1255
169
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
170
reference_url https://github.com/advisories/GHSA-pv36-h7jh-qm62
reference_id GHSA-pv36-h7jh-qm62
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv36-h7jh-qm62
171
reference_url https://security.gentoo.org/glsa/202010-07
reference_id GLSA-202010-07
reference_type
scores
url https://security.gentoo.org/glsa/202010-07
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
reference_id J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
173
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
174
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
175
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
176
reference_url https://access.redhat.com/errata/RHSA-2020:4351
reference_id RHSA-2020:4351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4351
177
reference_url https://access.redhat.com/errata/RHSA-2020:4907
reference_id RHSA-2020:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4907
178
reference_url https://access.redhat.com/errata/RHSA-2020:4949
reference_id RHSA-2020:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4949
179
reference_url https://access.redhat.com/errata/RHSA-2020:4950
reference_id RHSA-2020:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4950
180
reference_url https://access.redhat.com/errata/RHSA-2020:4951
reference_id RHSA-2020:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4951
181
reference_url https://access.redhat.com/errata/RHSA-2020:4952
reference_id RHSA-2020:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4952
182
reference_url https://usn.ubuntu.com/4593-1/
reference_id USN-4593-1
reference_type
scores
url https://usn.ubuntu.com/4593-1/
183
reference_url https://usn.ubuntu.com/4593-2/
reference_id USN-4593-2
reference_type
scores
url https://usn.ubuntu.com/4593-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-15999, GHSA-pv36-h7jh-qm62
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4
12
url VCID-qewm-wn6h-b3f3
vulnerability_id VCID-qewm-wn6h-b3f3
summary OneCRL was non-functional in the new Firefox for Android due to a missing service initialization. This could result in a failure to enforce some certificate revocations.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26957
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39396
published_at 2026-04-16T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39208
published_at 2026-04-01T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39381
published_at 2026-04-02T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39405
published_at 2026-04-04T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39319
published_at 2026-04-07T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39374
published_at 2026-04-08T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39391
published_at 2026-04-09T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39402
published_at 2026-04-11T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39363
published_at 2026-04-12T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39344
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26957
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26957
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qewm-wn6h-b3f3
13
url VCID-sb4d-y4bp-k3h9
vulnerability_id VCID-sb4d-y4bp-k3h9
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26958.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26958.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26958
reference_id
reference_type
scores
0
value 0.0046
scoring_system epss
scoring_elements 0.64144
published_at 2026-04-16T12:55:00Z
1
value 0.0046
scoring_system epss
scoring_elements 0.64121
published_at 2026-04-08T12:55:00Z
2
value 0.0046
scoring_system epss
scoring_elements 0.64137
published_at 2026-04-09T12:55:00Z
3
value 0.0046
scoring_system epss
scoring_elements 0.64149
published_at 2026-04-11T12:55:00Z
4
value 0.0046
scoring_system epss
scoring_elements 0.64138
published_at 2026-04-12T12:55:00Z
5
value 0.0046
scoring_system epss
scoring_elements 0.64108
published_at 2026-04-13T12:55:00Z
6
value 0.0046
scoring_system epss
scoring_elements 0.64026
published_at 2026-04-01T12:55:00Z
7
value 0.0046
scoring_system epss
scoring_elements 0.64083
published_at 2026-04-02T12:55:00Z
8
value 0.0046
scoring_system epss
scoring_elements 0.64111
published_at 2026-04-04T12:55:00Z
9
value 0.0046
scoring_system epss
scoring_elements 0.6407
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26958
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898735
reference_id 1898735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898735
14
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
15
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
16
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
20
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
21
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
22
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
23
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
24
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
25
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
26
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
27
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
28
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
29
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
30
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
31
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
32
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
33
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
34
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26958
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sb4d-y4bp-k3h9
14
url VCID-ufy5-eyqn-ybfw
vulnerability_id VCID-ufy5-eyqn-ybfw
summary Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26962
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44604
published_at 2026-04-16T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44473
published_at 2026-04-01T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.44576
published_at 2026-04-11T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44547
published_at 2026-04-12T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44548
published_at 2026-04-13T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44544
published_at 2026-04-02T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44565
published_at 2026-04-04T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44504
published_at 2026-04-07T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.44554
published_at 2026-04-08T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.4456
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26962
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
3
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
5
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
6
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26962
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ufy5-eyqn-ybfw
15
url VCID-uhjp-n763-cfc9
vulnerability_id VCID-uhjp-n763-cfc9
summary Repeated calls to the history and location interfaces could have been used to hang the browser. This was addressed by introducing rate-limiting to these API calls.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26963
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.61051
published_at 2026-04-16T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-01T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.61044
published_at 2026-04-11T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.61029
published_at 2026-04-12T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.6101
published_at 2026-04-13T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.60964
published_at 2026-04-02T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.60993
published_at 2026-04-04T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-07T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61007
published_at 2026-04-08T12:55:00Z
9
value 0.00405
scoring_system epss
scoring_elements 0.61023
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26963
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
3
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
5
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
6
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26963
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhjp-n763-cfc9
16
url VCID-urpr-qse2-7kcf
vulnerability_id VCID-urpr-qse2-7kcf
summary Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26966.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26966
reference_id
reference_type
scores
0
value 0.00444
scoring_system epss
scoring_elements 0.63421
published_at 2026-04-16T12:55:00Z
1
value 0.00444
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-08T12:55:00Z
2
value 0.00444
scoring_system epss
scoring_elements 0.63422
published_at 2026-04-12T12:55:00Z
3
value 0.00444
scoring_system epss
scoring_elements 0.63439
published_at 2026-04-11T12:55:00Z
4
value 0.00444
scoring_system epss
scoring_elements 0.63386
published_at 2026-04-13T12:55:00Z
5
value 0.00444
scoring_system epss
scoring_elements 0.633
published_at 2026-04-01T12:55:00Z
6
value 0.00444
scoring_system epss
scoring_elements 0.6336
published_at 2026-04-02T12:55:00Z
7
value 0.00444
scoring_system epss
scoring_elements 0.63387
published_at 2026-04-04T12:55:00Z
8
value 0.00444
scoring_system epss
scoring_elements 0.63352
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26966
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898740
reference_id 1898740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898740
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26966
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-urpr-qse2-7kcf
17
url VCID-v26p-ngz2-tkcd
vulnerability_id VCID-v26p-ngz2-tkcd
summary Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26952
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.62148
published_at 2026-04-16T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.61976
published_at 2026-04-01T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62125
published_at 2026-04-12T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62103
published_at 2026-04-13T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62047
published_at 2026-04-02T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62079
published_at 2026-04-04T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62048
published_at 2026-04-07T12:55:00Z
7
value 0.00423
scoring_system epss
scoring_elements 0.62098
published_at 2026-04-08T12:55:00Z
8
value 0.00423
scoring_system epss
scoring_elements 0.62116
published_at 2026-04-09T12:55:00Z
9
value 0.00423
scoring_system epss
scoring_elements 0.62135
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26952
1
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
2
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
4
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
5
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26952
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v26p-ngz2-tkcd
18
url VCID-wxt9-u43n-2qhs
vulnerability_id VCID-wxt9-u43n-2qhs
summary When accepting a malicious intent from other installed apps, Firefox for Android accepted manifests from arbitrary file paths and allowed declaring webapp manifests for other origins. This could be used to gain fullscreen access for UI spoofing and could also lead to cross-origin attacks on targeted websites.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26954
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51852
published_at 2026-04-16T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51707
published_at 2026-04-01T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51756
published_at 2026-04-02T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51782
published_at 2026-04-04T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51742
published_at 2026-04-07T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51797
published_at 2026-04-08T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51794
published_at 2026-04-09T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51845
published_at 2026-04-11T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-12T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26954
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-26954
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxt9-u43n-2qhs
19
url VCID-yg7c-ar4c-w3fn
vulnerability_id VCID-yg7c-ar4c-w3fn
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16012.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16012
reference_id
reference_type
scores
0
value 0.04946
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-16T12:55:00Z
1
value 0.04946
scoring_system epss
scoring_elements 0.89627
published_at 2026-04-07T12:55:00Z
2
value 0.04946
scoring_system epss
scoring_elements 0.89643
published_at 2026-04-08T12:55:00Z
3
value 0.04946
scoring_system epss
scoring_elements 0.89649
published_at 2026-04-09T12:55:00Z
4
value 0.04946
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-11T12:55:00Z
5
value 0.04946
scoring_system epss
scoring_elements 0.89654
published_at 2026-04-12T12:55:00Z
6
value 0.04946
scoring_system epss
scoring_elements 0.89648
published_at 2026-04-13T12:55:00Z
7
value 0.04946
scoring_system epss
scoring_elements 0.89609
published_at 2026-04-01T12:55:00Z
8
value 0.04946
scoring_system epss
scoring_elements 0.89612
published_at 2026-04-02T12:55:00Z
9
value 0.04946
scoring_system epss
scoring_elements 0.89626
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
151
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
152
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898732
reference_id 1898732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898732
153
reference_url https://security.archlinux.org/ASA-202011-11
reference_id ASA-202011-11
reference_type
scores
url https://security.archlinux.org/ASA-202011-11
154
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
155
reference_url https://security.archlinux.org/AVG-1277
reference_id AVG-1277
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1277
156
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
157
reference_url https://security.gentoo.org/glsa/202012-03
reference_id GLSA-202012-03
reference_type
scores
url https://security.gentoo.org/glsa/202012-03
158
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
159
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
160
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
161
reference_url https://access.redhat.com/errata/RHSA-2020:5231
reference_id RHSA-2020:5231
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5231
162
reference_url https://access.redhat.com/errata/RHSA-2020:5232
reference_id RHSA-2020:5232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5232
163
reference_url https://access.redhat.com/errata/RHSA-2020:5233
reference_id RHSA-2020:5233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5233
164
reference_url https://access.redhat.com/errata/RHSA-2020:5234
reference_id RHSA-2020:5234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5234
165
reference_url https://access.redhat.com/errata/RHSA-2020:5235
reference_id RHSA-2020:5235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5235
166
reference_url https://access.redhat.com/errata/RHSA-2020:5236
reference_id RHSA-2020:5236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5236
167
reference_url https://access.redhat.com/errata/RHSA-2020:5237
reference_id RHSA-2020:5237
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5237
168
reference_url https://access.redhat.com/errata/RHSA-2020:5238
reference_id RHSA-2020:5238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5238
169
reference_url https://access.redhat.com/errata/RHSA-2020:5239
reference_id RHSA-2020:5239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5239
170
reference_url https://access.redhat.com/errata/RHSA-2020:5240
reference_id RHSA-2020:5240
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5240
171
reference_url https://access.redhat.com/errata/RHSA-2020:5257
reference_id RHSA-2020:5257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5257
172
reference_url https://access.redhat.com/errata/RHSA-2020:5314
reference_id RHSA-2020:5314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5314
173
reference_url https://usn.ubuntu.com/4637-1/
reference_id USN-4637-1
reference_type
scores
url https://usn.ubuntu.com/4637-1/
174
reference_url https://usn.ubuntu.com/4637-2/
reference_id USN-4637-2
reference_type
scores
url https://usn.ubuntu.com/4637-2/
175
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox@83.0-r0?arch=x86_64&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community
aliases CVE-2020-16012
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg7c-ar4c-w3fn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@83.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=community