Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version82.0-r0
Qualifiers
arch x86_64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version82.0.3-r0
Latest_non_vulnerable_version119.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1q54-juu2-xbat
vulnerability_id VCID-1q54-juu2-xbat
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15683.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15683.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15683
reference_id
reference_type
scores
0
value 0.01566
scoring_system epss
scoring_elements 0.81544
published_at 2026-04-16T12:55:00Z
1
value 0.01566
scoring_system epss
scoring_elements 0.81474
published_at 2026-04-07T12:55:00Z
2
value 0.01566
scoring_system epss
scoring_elements 0.81501
published_at 2026-04-08T12:55:00Z
3
value 0.01566
scoring_system epss
scoring_elements 0.81507
published_at 2026-04-13T12:55:00Z
4
value 0.01566
scoring_system epss
scoring_elements 0.81527
published_at 2026-04-11T12:55:00Z
5
value 0.01566
scoring_system epss
scoring_elements 0.81514
published_at 2026-04-12T12:55:00Z
6
value 0.01566
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-01T12:55:00Z
7
value 0.01566
scoring_system epss
scoring_elements 0.81455
published_at 2026-04-02T12:55:00Z
8
value 0.01566
scoring_system epss
scoring_elements 0.81476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15683
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1889932
reference_id 1889932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1889932
6
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
7
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
8
reference_url https://security.gentoo.org/glsa/202010-08
reference_id GLSA-202010-08
reference_type
scores
url https://security.gentoo.org/glsa/202010-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-46
reference_id mfsa2020-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-46
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-47
reference_id mfsa2020-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-47
12
reference_url https://access.redhat.com/errata/RHSA-2020:4310
reference_id RHSA-2020:4310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4310
13
reference_url https://access.redhat.com/errata/RHSA-2020:4311
reference_id RHSA-2020:4311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4311
14
reference_url https://access.redhat.com/errata/RHSA-2020:4315
reference_id RHSA-2020:4315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4315
15
reference_url https://access.redhat.com/errata/RHSA-2020:4317
reference_id RHSA-2020:4317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4317
16
reference_url https://access.redhat.com/errata/RHSA-2020:4330
reference_id RHSA-2020:4330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4330
17
reference_url https://access.redhat.com/errata/RHSA-2020:4909
reference_id RHSA-2020:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4909
18
reference_url https://access.redhat.com/errata/RHSA-2020:4913
reference_id RHSA-2020:4913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4913
19
reference_url https://access.redhat.com/errata/RHSA-2020:4944
reference_id RHSA-2020:4944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4944
20
reference_url https://access.redhat.com/errata/RHSA-2020:4945
reference_id RHSA-2020:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4945
21
reference_url https://access.redhat.com/errata/RHSA-2020:4947
reference_id RHSA-2020:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4947
22
reference_url https://access.redhat.com/errata/RHSA-2020:4948
reference_id RHSA-2020:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4948
23
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
24
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
25
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15683
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1q54-juu2-xbat
1
url VCID-8ckv-8maw-k3af
vulnerability_id VCID-8ckv-8maw-k3af
summary When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15681
reference_id
reference_type
scores
0
value 0.00434
scoring_system epss
scoring_elements 0.62886
published_at 2026-04-16T12:55:00Z
1
value 0.00434
scoring_system epss
scoring_elements 0.62741
published_at 2026-04-01T12:55:00Z
2
value 0.00434
scoring_system epss
scoring_elements 0.62867
published_at 2026-04-12T12:55:00Z
3
value 0.00434
scoring_system epss
scoring_elements 0.62845
published_at 2026-04-13T12:55:00Z
4
value 0.00434
scoring_system epss
scoring_elements 0.62799
published_at 2026-04-02T12:55:00Z
5
value 0.00434
scoring_system epss
scoring_elements 0.62829
published_at 2026-04-04T12:55:00Z
6
value 0.00434
scoring_system epss
scoring_elements 0.62793
published_at 2026-04-07T12:55:00Z
7
value 0.00434
scoring_system epss
scoring_elements 0.62844
published_at 2026-04-08T12:55:00Z
8
value 0.00434
scoring_system epss
scoring_elements 0.62861
published_at 2026-04-09T12:55:00Z
9
value 0.00434
scoring_system epss
scoring_elements 0.62879
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15681
1
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
2
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
4
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
5
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15681
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ckv-8maw-k3af
2
url VCID-9z19-npd3-sbar
vulnerability_id VCID-9z19-npd3-sbar
summary When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15682
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32912
published_at 2026-04-16T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32865
published_at 2026-04-01T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32897
published_at 2026-04-12T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32872
published_at 2026-04-13T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32996
published_at 2026-04-02T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.33031
published_at 2026-04-04T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-07T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32901
published_at 2026-04-08T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32932
published_at 2026-04-09T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32935
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15682
1
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
2
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
4
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
5
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15682
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z19-npd3-sbar
3
url VCID-m1pc-eqy5-2khu
vulnerability_id VCID-m1pc-eqy5-2khu
summary If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15680
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55099
published_at 2026-04-16T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.54931
published_at 2026-04-01T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-04-11T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55079
published_at 2026-04-12T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55036
published_at 2026-04-02T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55061
published_at 2026-04-13T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55037
published_at 2026-04-07T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55086
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15680
1
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
2
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
4
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
5
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15680
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1pc-eqy5-2khu
4
url VCID-ndex-79sm-gfak
vulnerability_id VCID-ndex-79sm-gfak
summary Mozilla developers Christian Holler, Sebastian Hengst, Bogdan Tara, and Tyson Smith reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15684.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15684.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15684
reference_id
reference_type
scores
0
value 0.00419
scoring_system epss
scoring_elements 0.61763
published_at 2026-04-01T12:55:00Z
1
value 0.00419
scoring_system epss
scoring_elements 0.61937
published_at 2026-04-16T12:55:00Z
2
value 0.00419
scoring_system epss
scoring_elements 0.61913
published_at 2026-04-12T12:55:00Z
3
value 0.00419
scoring_system epss
scoring_elements 0.61893
published_at 2026-04-13T12:55:00Z
4
value 0.00419
scoring_system epss
scoring_elements 0.61837
published_at 2026-04-02T12:55:00Z
5
value 0.00419
scoring_system epss
scoring_elements 0.61867
published_at 2026-04-04T12:55:00Z
6
value 0.00419
scoring_system epss
scoring_elements 0.61839
published_at 2026-04-07T12:55:00Z
7
value 0.00419
scoring_system epss
scoring_elements 0.61889
published_at 2026-04-08T12:55:00Z
8
value 0.00419
scoring_system epss
scoring_elements 0.61904
published_at 2026-04-09T12:55:00Z
9
value 0.00419
scoring_system epss
scoring_elements 0.61925
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15684
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1963792
reference_id 1963792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1963792
3
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
4
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
6
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
7
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15684
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndex-79sm-gfak
5
url VCID-unmm-942j-gkh7
vulnerability_id VCID-unmm-942j-gkh7
summary
crossbeam-channel Undefined Behavior before v0.4.4
### Impact

The affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements.

### Patches

This has been fixed in crossbeam-channel 0.4.4.

We recommend users to upgrade to 0.4.4.

### References

See https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details.

### License

This advisory is in the public domain.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15254.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15254
reference_id
reference_type
scores
0
value 0.0051
scoring_system epss
scoring_elements 0.66394
published_at 2026-04-16T12:55:00Z
1
value 0.0051
scoring_system epss
scoring_elements 0.66359
published_at 2026-04-13T12:55:00Z
2
value 0.0051
scoring_system epss
scoring_elements 0.6639
published_at 2026-04-12T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-02T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66285
published_at 2026-04-01T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.66403
published_at 2026-04-11T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.66383
published_at 2026-04-09T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.66351
published_at 2026-04-04T12:55:00Z
8
value 0.0051
scoring_system epss
scoring_elements 0.66369
published_at 2026-04-08T12:55:00Z
9
value 0.0051
scoring_system epss
scoring_elements 0.66321
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15254
2
reference_url https://github.com/crossbeam-rs/crossbeam
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam
3
reference_url https://github.com/crossbeam-rs/crossbeam/issues/539
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/issues/539
4
reference_url https://github.com/crossbeam-rs/crossbeam/pull/533
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/pull/533
5
reference_url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx
6
reference_url https://github.com/RustSec/advisory-db/pull/425
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/RustSec/advisory-db/pull/425
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15254
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15254
8
reference_url https://rustsec.org/advisories/RUSTSEC-2020-0052.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2020-0052.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1963791
reference_id 1963791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1963791
10
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
11
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
12
reference_url https://github.com/advisories/GHSA-v5m7-53cv-f3hx
reference_id GHSA-v5m7-53cv-f3hx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v5m7-53cv-f3hx
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
14
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
15
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15254, GHSA-v5m7-53cv-f3hx
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unmm-942j-gkh7
6
url VCID-uwzy-pbnf-kkfw
vulnerability_id VCID-uwzy-pbnf-kkfw
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15969.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15969.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15969
reference_id
reference_type
scores
0
value 0.03155
scoring_system epss
scoring_elements 0.86922
published_at 2026-04-16T12:55:00Z
1
value 0.03155
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-07T12:55:00Z
2
value 0.03155
scoring_system epss
scoring_elements 0.86894
published_at 2026-04-08T12:55:00Z
3
value 0.03155
scoring_system epss
scoring_elements 0.86903
published_at 2026-04-09T12:55:00Z
4
value 0.03155
scoring_system epss
scoring_elements 0.86916
published_at 2026-04-11T12:55:00Z
5
value 0.03155
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-12T12:55:00Z
6
value 0.03155
scoring_system epss
scoring_elements 0.86906
published_at 2026-04-13T12:55:00Z
7
value 0.03155
scoring_system epss
scoring_elements 0.86851
published_at 2026-04-01T12:55:00Z
8
value 0.03155
scoring_system epss
scoring_elements 0.86861
published_at 2026-04-02T12:55:00Z
9
value 0.03155
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15969
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
143
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
144
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1885885
reference_id 1885885
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1885885
145
reference_url https://security.archlinux.org/ASA-202010-1
reference_id ASA-202010-1
reference_type
scores
url https://security.archlinux.org/ASA-202010-1
146
reference_url https://security.archlinux.org/ASA-202011-1
reference_id ASA-202011-1
reference_type
scores
url https://security.archlinux.org/ASA-202011-1
147
reference_url https://security.archlinux.org/AVG-1238
reference_id AVG-1238
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1238
148
reference_url https://security.archlinux.org/AVG-1256
reference_id AVG-1256
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1256
149
reference_url https://security.gentoo.org/glsa/202010-01
reference_id GLSA-202010-01
reference_type
scores
url https://security.gentoo.org/glsa/202010-01
150
reference_url https://security.gentoo.org/glsa/202010-08
reference_id GLSA-202010-08
reference_type
scores
url https://security.gentoo.org/glsa/202010-08
151
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
reference_id mfsa2020-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-45
152
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-46
reference_id mfsa2020-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-46
153
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-47
reference_id mfsa2020-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-47
154
reference_url https://access.redhat.com/errata/RHSA-2020:4235
reference_id RHSA-2020:4235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4235
155
reference_url https://access.redhat.com/errata/RHSA-2020:4310
reference_id RHSA-2020:4310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4310
156
reference_url https://access.redhat.com/errata/RHSA-2020:4311
reference_id RHSA-2020:4311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4311
157
reference_url https://access.redhat.com/errata/RHSA-2020:4315
reference_id RHSA-2020:4315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4315
158
reference_url https://access.redhat.com/errata/RHSA-2020:4317
reference_id RHSA-2020:4317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4317
159
reference_url https://access.redhat.com/errata/RHSA-2020:4330
reference_id RHSA-2020:4330
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4330
160
reference_url https://access.redhat.com/errata/RHSA-2020:4909
reference_id RHSA-2020:4909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4909
161
reference_url https://access.redhat.com/errata/RHSA-2020:4913
reference_id RHSA-2020:4913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4913
162
reference_url https://access.redhat.com/errata/RHSA-2020:4944
reference_id RHSA-2020:4944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4944
163
reference_url https://access.redhat.com/errata/RHSA-2020:4945
reference_id RHSA-2020:4945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4945
164
reference_url https://access.redhat.com/errata/RHSA-2020:4947
reference_id RHSA-2020:4947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4947
165
reference_url https://access.redhat.com/errata/RHSA-2020:4948
reference_id RHSA-2020:4948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4948
166
reference_url https://usn.ubuntu.com/4599-1/
reference_id USN-4599-1
reference_type
scores
url https://usn.ubuntu.com/4599-1/
167
reference_url https://usn.ubuntu.com/4599-2/
reference_id USN-4599-2
reference_type
scores
url https://usn.ubuntu.com/4599-2/
168
reference_url https://usn.ubuntu.com/4647-1/
reference_id USN-4647-1
reference_type
scores
url https://usn.ubuntu.com/4647-1/
fixed_packages
0
url pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@82.0-r0?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2020-15969
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwzy-pbnf-kkfw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=x86_64&distroversion=v3.23&reponame=community