Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version78.2.0-r0
Qualifiers
arch x86
distroversion v3.21
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version78.3.0-r0
Latest_non_vulnerable_version115.6.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-jtsz-m5jr-ebdc
vulnerability_id VCID-jtsz-m5jr-ebdc
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15664
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58923
published_at 2026-04-18T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58846
published_at 2026-04-07T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58899
published_at 2026-04-08T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58905
published_at 2026-04-09T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58922
published_at 2026-04-11T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58904
published_at 2026-04-12T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-13T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58918
published_at 2026-04-16T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58781
published_at 2026-04-01T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58856
published_at 2026-04-02T12:55:00Z
10
value 0.00371
scoring_system epss
scoring_elements 0.58878
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872531
reference_id 1872531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872531
6
reference_url https://security.gentoo.org/glsa/202008-16
reference_id GLSA-202008-16
reference_type
scores
url https://security.gentoo.org/glsa/202008-16
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
reference_id mfsa2020-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
reference_id mfsa2020-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
13
reference_url https://access.redhat.com/errata/RHSA-2020:3555
reference_id RHSA-2020:3555
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3555
14
reference_url https://access.redhat.com/errata/RHSA-2020:3556
reference_id RHSA-2020:3556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3556
15
reference_url https://access.redhat.com/errata/RHSA-2020:3557
reference_id RHSA-2020:3557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3557
16
reference_url https://access.redhat.com/errata/RHSA-2020:3558
reference_id RHSA-2020:3558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3558
17
reference_url https://access.redhat.com/errata/RHSA-2020:3559
reference_id RHSA-2020:3559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3559
18
reference_url https://access.redhat.com/errata/RHSA-2020:3631
reference_id RHSA-2020:3631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3631
19
reference_url https://access.redhat.com/errata/RHSA-2020:3632
reference_id RHSA-2020:3632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3632
20
reference_url https://access.redhat.com/errata/RHSA-2020:3633
reference_id RHSA-2020:3633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3633
21
reference_url https://access.redhat.com/errata/RHSA-2020:3634
reference_id RHSA-2020:3634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3634
22
reference_url https://access.redhat.com/errata/RHSA-2020:3643
reference_id RHSA-2020:3643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3643
23
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.2.0-r0%3Farch=x86&distroversion=v3.21&reponame=community
aliases CVE-2020-15664
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtsz-m5jr-ebdc
1
url VCID-kbpr-dnqh-37fu
vulnerability_id VCID-kbpr-dnqh-37fu
summary Mozilla developers Jason Kratzer, Christian Holler, and Byron Campen reported memory safety bugs present in Firefox 79 and Firefox ESR 78.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15670
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59692
published_at 2026-04-18T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59667
published_at 2026-04-09T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59687
published_at 2026-04-11T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-12T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59651
published_at 2026-04-13T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59684
published_at 2026-04-16T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59536
published_at 2026-04-01T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59609
published_at 2026-04-02T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59634
published_at 2026-04-04T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59603
published_at 2026-04-07T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.59654
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15670
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872533
reference_id 1872533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872533
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
reference_id mfsa2020-39
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-39
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
8
reference_url https://usn.ubuntu.com/4474-1/
reference_id USN-4474-1
reference_type
scores
url https://usn.ubuntu.com/4474-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.2.0-r0%3Farch=x86&distroversion=v3.21&reponame=community
aliases CVE-2020-15670
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbpr-dnqh-37fu
2
url VCID-vun4-z8ju-gbbc
vulnerability_id VCID-vun4-z8ju-gbbc
summary If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15663
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-18T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82103
published_at 2026-04-07T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.8213
published_at 2026-04-08T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-09T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82156
published_at 2026-04-11T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82147
published_at 2026-04-12T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82141
published_at 2026-04-13T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82074
published_at 2026-04-01T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82086
published_at 2026-04-02T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82107
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15663
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872530
reference_id 1872530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872530
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
reference_id mfsa2020-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-36
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
reference_id mfsa2020-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-37
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
reference_id mfsa2020-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-38
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
reference_id mfsa2020-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-40
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
reference_id mfsa2020-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-41
fixed_packages
0
url pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/firefox-esr@78.2.0-r0?arch=x86&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.2.0-r0%3Farch=x86&distroversion=v3.21&reponame=community
aliases CVE-2020-15663
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vun4-z8ju-gbbc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.2.0-r0%3Farch=x86&distroversion=v3.21&reponame=community