Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/404372?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "type": "apk", "namespace": "alpine", "name": "firefox", "version": "77.0-r0", "qualifiers": { "arch": "s390x", "distroversion": "v3.15", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "78.0-r0", "latest_non_vulnerable_version": "94.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58904?format=api", "vulnerability_id": "VCID-a9b9-3zxy-hubc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12409", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46344", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46218", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46306", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46278", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46287", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46279", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46282", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46283", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12409" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12409" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b9-3zxy-hubc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58902?format=api", "vulnerability_id": "VCID-etfm-p55m-eyb7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37681", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37532", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37662", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37714", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37739", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37618", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37669", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37682", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12408" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12408" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-etfm-p55m-eyb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46230?format=api", "vulnerability_id": "VCID-hay5-714d-u7fd", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71123", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71092", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71071", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843313", "reference_id": "1843313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843313" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2378", "reference_id": "RHSA-2020:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2379", "reference_id": "RHSA-2020:2379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2380", "reference_id": "RHSA-2020:2380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2381", "reference_id": "RHSA-2020:2381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2382", "reference_id": "RHSA-2020:2382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12405" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hay5-714d-u7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61777?format=api", "vulnerability_id": "VCID-k2s2-zkua-8ydy", "summary": "NSS has an information disclosure vulnerability when handling DSA\n keys.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2693", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826177", "reference_id": "1826177", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826177" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752", "reference_id": "961752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202007-49", "reference_id": "GLSA-202007-49", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3280", "reference_id": "RHSA-2020:3280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3280" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4397-1/", "reference_id": "USN-4397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4397-1/" }, { "reference_url": "https://usn.ubuntu.com/4397-2/", "reference_id": "USN-4397-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4397-2/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12399" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2s2-zkua-8ydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58901?format=api", "vulnerability_id": "VCID-rnmw-6ddn-dqg6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55437", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55448", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55426", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55408", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55386", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12407" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnmw-6ddn-dqg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58906?format=api", "vulnerability_id": "VCID-uqp4-vjty-q3dh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12411", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64258", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64138", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64249", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12411" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12411" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqp4-vjty-q3dh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46231?format=api", "vulnerability_id": "VCID-w89k-tvfx-cbez", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57704", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.5759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57696", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843312", "reference_id": "1843312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843312" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2378", "reference_id": "RHSA-2020:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2379", "reference_id": "RHSA-2020:2379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2380", "reference_id": "RHSA-2020:2380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2381", "reference_id": "RHSA-2020:2381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2382", "reference_id": "RHSA-2020:2382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/404372?format=api", "purl": "pkg:apk/alpine/firefox@77.0-r0?arch=s390x&distroversion=v3.15&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" } ], "aliases": [ "CVE-2020-12406" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w89k-tvfx-cbez" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@77.0-r0%3Farch=s390x&distroversion=v3.15&reponame=community" }