Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version84.0.1-r0
Qualifiers
arch x86
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version84.0.2-r0
Latest_non_vulnerable_version119.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-38j9-cugr-abc9
vulnerability_id VCID-38j9-cugr-abc9
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35113
reference_id
reference_type
scores
0
value 0.00535
scoring_system epss
scoring_elements 0.67505
published_at 2026-04-18T12:55:00Z
1
value 0.00535
scoring_system epss
scoring_elements 0.67467
published_at 2026-04-08T12:55:00Z
2
value 0.00535
scoring_system epss
scoring_elements 0.67481
published_at 2026-04-09T12:55:00Z
3
value 0.00535
scoring_system epss
scoring_elements 0.67504
published_at 2026-04-11T12:55:00Z
4
value 0.00535
scoring_system epss
scoring_elements 0.67491
published_at 2026-04-12T12:55:00Z
5
value 0.00535
scoring_system epss
scoring_elements 0.67457
published_at 2026-04-13T12:55:00Z
6
value 0.00535
scoring_system epss
scoring_elements 0.67493
published_at 2026-04-16T12:55:00Z
7
value 0.00535
scoring_system epss
scoring_elements 0.67379
published_at 2026-04-01T12:55:00Z
8
value 0.00535
scoring_system epss
scoring_elements 0.67415
published_at 2026-04-02T12:55:00Z
9
value 0.00535
scoring_system epss
scoring_elements 0.67437
published_at 2026-04-04T12:55:00Z
10
value 0.00535
scoring_system epss
scoring_elements 0.67416
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35113
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908029
reference_id 1908029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908029
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-35113
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38j9-cugr-abc9
1
url VCID-3yea-3gw6-xkcb
vulnerability_id VCID-3yea-3gw6-xkcb
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35111
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-18T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.5488
published_at 2026-04-08T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54877
published_at 2026-04-09T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54889
published_at 2026-04-11T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54871
published_at 2026-04-12T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54848
published_at 2026-04-13T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.54886
published_at 2026-04-16T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54766
published_at 2026-04-01T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54837
published_at 2026-04-02T12:55:00Z
9
value 0.00318
scoring_system epss
scoring_elements 0.54861
published_at 2026-04-04T12:55:00Z
10
value 0.00318
scoring_system epss
scoring_elements 0.5483
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908027
reference_id 1908027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908027
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-35111
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yea-3gw6-xkcb
2
url VCID-5pf4-9k7e-hbee
vulnerability_id VCID-5pf4-9k7e-hbee
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16042
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60493
published_at 2026-04-18T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60392
published_at 2026-04-07T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60441
published_at 2026-04-08T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60458
published_at 2026-04-09T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60478
published_at 2026-04-11T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60464
published_at 2026-04-12T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60444
published_at 2026-04-13T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60485
published_at 2026-04-16T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60322
published_at 2026-04-01T12:55:00Z
9
value 0.00396
scoring_system epss
scoring_elements 0.60397
published_at 2026-04-02T12:55:00Z
10
value 0.00396
scoring_system epss
scoring_elements 0.60424
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16042
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
148
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
149
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1904515
reference_id 1904515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1904515
150
reference_url https://security.archlinux.org/ASA-202012-14
reference_id ASA-202012-14
reference_type
scores
url https://security.archlinux.org/ASA-202012-14
151
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
152
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
153
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
154
reference_url https://security.archlinux.org/AVG-1323
reference_id AVG-1323
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1323
155
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
156
reference_url https://security.gentoo.org/glsa/202012-05
reference_id GLSA-202012-05
reference_type
scores
url https://security.gentoo.org/glsa/202012-05
157
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
158
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
159
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
160
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
161
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
162
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
163
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
164
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
165
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
166
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
167
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
168
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
169
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
170
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
171
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
172
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-16042
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pf4-9k7e-hbee
3
url VCID-5utj-ddpa-17gq
vulnerability_id VCID-5utj-ddpa-17gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26974
reference_id
reference_type
scores
0
value 0.00761
scoring_system epss
scoring_elements 0.734
published_at 2026-04-18T12:55:00Z
1
value 0.00761
scoring_system epss
scoring_elements 0.7334
published_at 2026-04-08T12:55:00Z
2
value 0.00761
scoring_system epss
scoring_elements 0.73353
published_at 2026-04-09T12:55:00Z
3
value 0.00761
scoring_system epss
scoring_elements 0.73377
published_at 2026-04-11T12:55:00Z
4
value 0.00761
scoring_system epss
scoring_elements 0.73356
published_at 2026-04-12T12:55:00Z
5
value 0.00761
scoring_system epss
scoring_elements 0.73349
published_at 2026-04-13T12:55:00Z
6
value 0.00761
scoring_system epss
scoring_elements 0.73392
published_at 2026-04-16T12:55:00Z
7
value 0.00761
scoring_system epss
scoring_elements 0.73298
published_at 2026-04-01T12:55:00Z
8
value 0.00761
scoring_system epss
scoring_elements 0.73307
published_at 2026-04-02T12:55:00Z
9
value 0.00761
scoring_system epss
scoring_elements 0.73331
published_at 2026-04-04T12:55:00Z
10
value 0.00761
scoring_system epss
scoring_elements 0.73303
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26974
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908024
reference_id 1908024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908024
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26974
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5utj-ddpa-17gq
4
url VCID-63zq-gzan-8yff
vulnerability_id VCID-63zq-gzan-8yff
summary The lifecycle of IPC Actors allows managed actors to outlive their manager actors; and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26972
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66795
published_at 2026-04-18T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66668
published_at 2026-04-01T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66747
published_at 2026-04-13T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66781
published_at 2026-04-16T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66708
published_at 2026-04-02T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66734
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.66706
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66755
published_at 2026-04-08T12:55:00Z
8
value 0.00518
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-09T12:55:00Z
9
value 0.00518
scoring_system epss
scoring_elements 0.6679
published_at 2026-04-11T12:55:00Z
10
value 0.00518
scoring_system epss
scoring_elements 0.66776
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26972
1
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
2
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
4
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26972
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63zq-gzan-8yff
5
url VCID-7krh-czjm-4ufx
vulnerability_id VCID-7krh-czjm-4ufx
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26978
reference_id
reference_type
scores
0
value 0.00422
scoring_system epss
scoring_elements 0.62124
published_at 2026-04-18T12:55:00Z
1
value 0.00422
scoring_system epss
scoring_elements 0.6207
published_at 2026-04-08T12:55:00Z
2
value 0.00422
scoring_system epss
scoring_elements 0.62088
published_at 2026-04-09T12:55:00Z
3
value 0.00422
scoring_system epss
scoring_elements 0.62107
published_at 2026-04-11T12:55:00Z
4
value 0.00422
scoring_system epss
scoring_elements 0.62097
published_at 2026-04-12T12:55:00Z
5
value 0.00422
scoring_system epss
scoring_elements 0.62076
published_at 2026-04-13T12:55:00Z
6
value 0.00422
scoring_system epss
scoring_elements 0.62119
published_at 2026-04-16T12:55:00Z
7
value 0.00422
scoring_system epss
scoring_elements 0.61949
published_at 2026-04-01T12:55:00Z
8
value 0.00422
scoring_system epss
scoring_elements 0.6202
published_at 2026-04-07T12:55:00Z
9
value 0.00422
scoring_system epss
scoring_elements 0.62051
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26978
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908025
reference_id 1908025
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908025
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26978
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7krh-czjm-4ufx
6
url VCID-ccev-4z5c-u3hj
vulnerability_id VCID-ccev-4z5c-u3hj
summary Mozilla developers Christian Holler, Jan-Ivar Bruaroey, and Gabriele Svelto reported memory safety bugs present in Firefox 83. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35114
reference_id
reference_type
scores
0
value 0.00434
scoring_system epss
scoring_elements 0.62865
published_at 2026-04-18T12:55:00Z
1
value 0.00434
scoring_system epss
scoring_elements 0.62714
published_at 2026-04-01T12:55:00Z
2
value 0.00434
scoring_system epss
scoring_elements 0.6284
published_at 2026-04-12T12:55:00Z
3
value 0.00434
scoring_system epss
scoring_elements 0.62857
published_at 2026-04-16T12:55:00Z
4
value 0.00434
scoring_system epss
scoring_elements 0.62771
published_at 2026-04-02T12:55:00Z
5
value 0.00434
scoring_system epss
scoring_elements 0.62802
published_at 2026-04-04T12:55:00Z
6
value 0.00434
scoring_system epss
scoring_elements 0.62765
published_at 2026-04-07T12:55:00Z
7
value 0.00434
scoring_system epss
scoring_elements 0.62817
published_at 2026-04-13T12:55:00Z
8
value 0.00434
scoring_system epss
scoring_elements 0.62834
published_at 2026-04-09T12:55:00Z
9
value 0.00434
scoring_system epss
scoring_elements 0.62852
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35114
1
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
2
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
4
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-35114
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccev-4z5c-u3hj
7
url VCID-hs7f-4tav-dfcv
vulnerability_id VCID-hs7f-4tav-dfcv
summary When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26975
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.5948
published_at 2026-04-18T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-01T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59441
published_at 2026-04-13T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59473
published_at 2026-04-16T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59403
published_at 2026-04-02T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59427
published_at 2026-04-04T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59393
published_at 2026-04-07T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59443
published_at 2026-04-08T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59457
published_at 2026-04-09T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59476
published_at 2026-04-11T12:55:00Z
10
value 0.00379
scoring_system epss
scoring_elements 0.59459
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26975
1
reference_url https://security.archlinux.org/AVG-1363
reference_id AVG-1363
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1363
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26975
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hs7f-4tav-dfcv
8
url VCID-jyur-q447-t7hr
vulnerability_id VCID-jyur-q447-t7hr
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26973
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55626
published_at 2026-04-18T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55612
published_at 2026-04-08T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55614
published_at 2026-04-09T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55622
published_at 2026-04-11T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.55602
published_at 2026-04-12T12:55:00Z
5
value 0.00326
scoring_system epss
scoring_elements 0.55585
published_at 2026-04-13T12:55:00Z
6
value 0.00326
scoring_system epss
scoring_elements 0.55623
published_at 2026-04-16T12:55:00Z
7
value 0.00326
scoring_system epss
scoring_elements 0.55447
published_at 2026-04-01T12:55:00Z
8
value 0.00326
scoring_system epss
scoring_elements 0.55558
published_at 2026-04-02T12:55:00Z
9
value 0.00326
scoring_system epss
scoring_elements 0.55583
published_at 2026-04-04T12:55:00Z
10
value 0.00326
scoring_system epss
scoring_elements 0.5556
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26973
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908023
reference_id 1908023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908023
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26973
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyur-q447-t7hr
9
url VCID-m92a-91pv-dffv
vulnerability_id VCID-m92a-91pv-dffv
summary If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35112
reference_id
reference_type
scores
0
value 0.00532
scoring_system epss
scoring_elements 0.6735
published_at 2026-04-18T12:55:00Z
1
value 0.00532
scoring_system epss
scoring_elements 0.67266
published_at 2026-04-07T12:55:00Z
2
value 0.00532
scoring_system epss
scoring_elements 0.67318
published_at 2026-04-08T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.67331
published_at 2026-04-09T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67351
published_at 2026-04-11T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67338
published_at 2026-04-16T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67303
published_at 2026-04-13T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67228
published_at 2026-04-01T12:55:00Z
8
value 0.00532
scoring_system epss
scoring_elements 0.67265
published_at 2026-04-02T12:55:00Z
9
value 0.00532
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35112
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908028
reference_id 1908028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908028
4
reference_url https://security.archlinux.org/AVG-1364
reference_id AVG-1364
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1364
5
reference_url https://security.archlinux.org/AVG-1366
reference_id AVG-1366
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1366
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-35112
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m92a-91pv-dffv
10
url VCID-nzcd-dk9q-puh1
vulnerability_id VCID-nzcd-dk9q-puh1
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26976
reference_id
reference_type
scores
0
value 0.01973
scoring_system epss
scoring_elements 0.83582
published_at 2026-04-18T12:55:00Z
1
value 0.01973
scoring_system epss
scoring_elements 0.83533
published_at 2026-04-08T12:55:00Z
2
value 0.01973
scoring_system epss
scoring_elements 0.83542
published_at 2026-04-09T12:55:00Z
3
value 0.01973
scoring_system epss
scoring_elements 0.83557
published_at 2026-04-11T12:55:00Z
4
value 0.01973
scoring_system epss
scoring_elements 0.83551
published_at 2026-04-12T12:55:00Z
5
value 0.01973
scoring_system epss
scoring_elements 0.83547
published_at 2026-04-13T12:55:00Z
6
value 0.01973
scoring_system epss
scoring_elements 0.83581
published_at 2026-04-16T12:55:00Z
7
value 0.01973
scoring_system epss
scoring_elements 0.83481
published_at 2026-04-01T12:55:00Z
8
value 0.01973
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-02T12:55:00Z
9
value 0.01973
scoring_system epss
scoring_elements 0.83508
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26976
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1920649
reference_id 1920649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1920649
11
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
12
reference_url https://security.archlinux.org/ASA-202102-2
reference_id ASA-202102-2
reference_type
scores
url https://security.archlinux.org/ASA-202102-2
13
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
14
reference_url https://security.archlinux.org/AVG-1496
reference_id AVG-1496
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1496
15
reference_url https://security.gentoo.org/glsa/202102-02
reference_id GLSA-202102-02
reference_type
scores
url https://security.gentoo.org/glsa/202102-02
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-04
reference_id mfsa2021-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-04
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2021-05
reference_id mfsa2021-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2021-05
19
reference_url https://access.redhat.com/errata/RHSA-2021:0285
reference_id RHSA-2021:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0285
20
reference_url https://access.redhat.com/errata/RHSA-2021:0288
reference_id RHSA-2021:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0288
21
reference_url https://access.redhat.com/errata/RHSA-2021:0289
reference_id RHSA-2021:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0289
22
reference_url https://access.redhat.com/errata/RHSA-2021:0290
reference_id RHSA-2021:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0290
23
reference_url https://access.redhat.com/errata/RHSA-2021:0297
reference_id RHSA-2021:0297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0297
24
reference_url https://access.redhat.com/errata/RHSA-2021:0298
reference_id RHSA-2021:0298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0298
25
reference_url https://access.redhat.com/errata/RHSA-2021:0299
reference_id RHSA-2021:0299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0299
26
reference_url https://access.redhat.com/errata/RHSA-2021:0397
reference_id RHSA-2021:0397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0397
27
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
28
reference_url https://usn.ubuntu.com/4736-1/
reference_id USN-4736-1
reference_type
scores
url https://usn.ubuntu.com/4736-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26976
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nzcd-dk9q-puh1
11
url VCID-t52g-d7e2-zkd4
vulnerability_id VCID-t52g-d7e2-zkd4
summary By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26977
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59694
published_at 2026-04-18T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-01T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59653
published_at 2026-04-13T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59686
published_at 2026-04-16T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59611
published_at 2026-04-02T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-04T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59605
published_at 2026-04-07T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59656
published_at 2026-04-08T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-09T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59689
published_at 2026-04-11T12:55:00Z
10
value 0.00384
scoring_system epss
scoring_elements 0.59672
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26977
1
reference_url https://security.archlinux.org/AVG-1363
reference_id AVG-1363
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1363
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26977
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t52g-d7e2-zkd4
12
url VCID-v5vy-j784-r3bj
vulnerability_id VCID-v5vy-j784-r3bj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Mozilla Thunderbird, the worst of which could result in the arbitrary
    execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26971
reference_id
reference_type
scores
0
value 0.0106
scoring_system epss
scoring_elements 0.77672
published_at 2026-04-18T12:55:00Z
1
value 0.0106
scoring_system epss
scoring_elements 0.77621
published_at 2026-04-08T12:55:00Z
2
value 0.0106
scoring_system epss
scoring_elements 0.77627
published_at 2026-04-09T12:55:00Z
3
value 0.0106
scoring_system epss
scoring_elements 0.77654
published_at 2026-04-11T12:55:00Z
4
value 0.0106
scoring_system epss
scoring_elements 0.77638
published_at 2026-04-12T12:55:00Z
5
value 0.0106
scoring_system epss
scoring_elements 0.77636
published_at 2026-04-13T12:55:00Z
6
value 0.0106
scoring_system epss
scoring_elements 0.77674
published_at 2026-04-16T12:55:00Z
7
value 0.0106
scoring_system epss
scoring_elements 0.77578
published_at 2026-04-01T12:55:00Z
8
value 0.0106
scoring_system epss
scoring_elements 0.77585
published_at 2026-04-02T12:55:00Z
9
value 0.0106
scoring_system epss
scoring_elements 0.77611
published_at 2026-04-04T12:55:00Z
10
value 0.0106
scoring_system epss
scoring_elements 0.77593
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908022
reference_id 1908022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908022
11
reference_url https://security.archlinux.org/ASA-202012-23
reference_id ASA-202012-23
reference_type
scores
url https://security.archlinux.org/ASA-202012-23
12
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
13
reference_url https://security.archlinux.org/AVG-1315
reference_id AVG-1315
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1315
14
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
15
reference_url https://security.gentoo.org/glsa/202012-20
reference_id GLSA-202012-20
reference_type
scores
url https://security.gentoo.org/glsa/202012-20
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
19
reference_url https://access.redhat.com/errata/RHSA-2020:5561
reference_id RHSA-2020:5561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5561
20
reference_url https://access.redhat.com/errata/RHSA-2020:5562
reference_id RHSA-2020:5562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5562
21
reference_url https://access.redhat.com/errata/RHSA-2020:5563
reference_id RHSA-2020:5563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5563
22
reference_url https://access.redhat.com/errata/RHSA-2020:5564
reference_id RHSA-2020:5564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5564
23
reference_url https://access.redhat.com/errata/RHSA-2020:5565
reference_id RHSA-2020:5565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5565
24
reference_url https://access.redhat.com/errata/RHSA-2020:5618
reference_id RHSA-2020:5618
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5618
25
reference_url https://access.redhat.com/errata/RHSA-2020:5622
reference_id RHSA-2020:5622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5622
26
reference_url https://access.redhat.com/errata/RHSA-2020:5624
reference_id RHSA-2020:5624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5624
27
reference_url https://access.redhat.com/errata/RHSA-2020:5644
reference_id RHSA-2020:5644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5644
28
reference_url https://access.redhat.com/errata/RHSA-2020:5645
reference_id RHSA-2020:5645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5645
29
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
30
reference_url https://usn.ubuntu.com/4701-1/
reference_id USN-4701-1
reference_type
scores
url https://usn.ubuntu.com/4701-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26971
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5vy-j784-r3bj
13
url VCID-z1a8-kgzw-vygg
vulnerability_id VCID-z1a8-kgzw-vygg
summary When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-26979
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48441
published_at 2026-04-18T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48327
published_at 2026-04-01T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48409
published_at 2026-04-11T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48395
published_at 2026-04-13T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48446
published_at 2026-04-16T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48362
published_at 2026-04-02T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48383
published_at 2026-04-12T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48336
published_at 2026-04-07T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48391
published_at 2026-04-08T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48385
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-26979
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.archlinux.org/ASA-202012-25
reference_id ASA-202012-25
reference_type
scores
url https://security.archlinux.org/ASA-202012-25
3
reference_url https://security.archlinux.org/AVG-1362
reference_id AVG-1362
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1362
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
5
reference_url https://usn.ubuntu.com/4671-1/
reference_id USN-4671-1
reference_type
scores
url https://usn.ubuntu.com/4671-1/
fixed_packages
0
url pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/firefox@84.0.1-r0?arch=x86&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community
aliases CVE-2020-26979
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a8-kgzw-vygg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=x86&distroversion=v3.20&reponame=community