Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/417199?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "type": "apk", "namespace": "alpine", "name": "firefox-esr", "version": "78.1.0-r0", "qualifiers": { "arch": "x86_64", "distroversion": "v3.12", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "78.2.0-r0", "latest_non_vulnerable_version": "78.11.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41407?format=api", "vulnerability_id": "VCID-14gr-rfym-5yha", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6463.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6463.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6463", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88033", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.87987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.87991", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88011", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88018", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88029", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.88035", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.87962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03747", "scoring_system": "epss", "scoring_elements": "0.87973", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840893", "reference_id": "1840893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840893" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://security.gentoo.org/glsa/202007-60", "reference_id": "GLSA-202007-60", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-60" }, { "reference_url": "https://security.gentoo.org/glsa/202007-64", "reference_id": "GLSA-202007-64", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-64" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35", "reference_id": "mfsa2020-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1970", "reference_id": "RHSA-2020:1970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3229", "reference_id": "RHSA-2020:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3233", "reference_id": "RHSA-2020:3233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3241", "reference_id": "RHSA-2020:3241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3253", "reference_id": "RHSA-2020:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3254", "reference_id": "RHSA-2020:3254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3341", "reference_id": "RHSA-2020:3341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3342", "reference_id": "RHSA-2020:3342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3343", "reference_id": "RHSA-2020:3343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3344", "reference_id": "RHSA-2020:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3345", "reference_id": "RHSA-2020:3345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3345" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-6463" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-14gr-rfym-5yha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63140?format=api", "vulnerability_id": "VCID-6h7s-a74e-33c1", "summary": "Mozilla developer Anne van Kesteren discovered that <iframe sandbox> with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51876", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51814", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51811", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51842", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51773", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51759", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15653" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861645", "reference_id": "1861645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861645" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15653" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6h7s-a74e-33c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63144?format=api", "vulnerability_id": "VCID-9tc4-qr6d-6kfu", "summary": "When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65513", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65558", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15654" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861649", "reference_id": "1861649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861649" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15654" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tc4-qr6d-6kfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41404?format=api", "vulnerability_id": "VCID-ak2m-xsvt-eqbs", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77563", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77609", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.7763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77531", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01055", "scoring_system": "epss", "scoring_elements": "0.77537", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861570", "reference_id": "1861570", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861570" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://security.gentoo.org/glsa/202007-60", "reference_id": "GLSA-202007-60", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-60" }, { "reference_url": "https://security.gentoo.org/glsa/202007-64", "reference_id": "GLSA-202007-64", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-64" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35", "reference_id": "mfsa2020-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3229", "reference_id": "RHSA-2020:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3233", "reference_id": "RHSA-2020:3233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3241", "reference_id": "RHSA-2020:3241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3253", "reference_id": "RHSA-2020:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3254", "reference_id": "RHSA-2020:3254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3341", "reference_id": "RHSA-2020:3341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3342", "reference_id": "RHSA-2020:3342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3343", "reference_id": "RHSA-2020:3343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3344", "reference_id": "RHSA-2020:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3345", "reference_id": "RHSA-2020:3345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3345" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15652" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ak2m-xsvt-eqbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63139?format=api", "vulnerability_id": "VCID-awnf-jwg6-k3bk", "summary": "Mozilla Developer Rob Wu discovered that a redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15655.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45798", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45752", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45775", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45665", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45731", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4575", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.457", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15655" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861644", "reference_id": "1861644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861644" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15655" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-awnf-jwg6-k3bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34623?format=api", "vulnerability_id": "VCID-f8fw-f3kt-8feb", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n Chrome, the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6514.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94456", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94452", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94437", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94429", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94406", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14455", "scoring_system": "epss", "scoring_elements": "0.94417", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857349", "reference_id": "1857349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1857349" }, { "reference_url": "https://security.archlinux.org/AVG-1206", "reference_id": "AVG-1206", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1206" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://security.gentoo.org/glsa/202007-64", "reference_id": "GLSA-202007-64", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-64" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35", "reference_id": "mfsa2020-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3229", "reference_id": "RHSA-2020:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3233", "reference_id": "RHSA-2020:3233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3241", "reference_id": "RHSA-2020:3241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3253", "reference_id": "RHSA-2020:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3254", "reference_id": "RHSA-2020:3254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3341", "reference_id": "RHSA-2020:3341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3342", "reference_id": "RHSA-2020:3342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3343", "reference_id": "RHSA-2020:3343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3344", "reference_id": "RHSA-2020:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3345", "reference_id": "RHSA-2020:3345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3377", "reference_id": "RHSA-2020:3377", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3377" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-6514" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f8fw-f3kt-8feb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63141?format=api", "vulnerability_id": "VCID-h4r6-jrxh-6kcf", "summary": "JIT optimizations involving the Javascript arguments object could confuse later optimizations.\nThis risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71915", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.7194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71858", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71859", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15656" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861646", "reference_id": "1861646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861646" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15656" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h4r6-jrxh-6kcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41406?format=api", "vulnerability_id": "VCID-jtyr-jd5m-87c3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15659.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15659.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15659", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76133", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76042", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.7609", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76091", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76088", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.76027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0093", "scoring_system": "epss", "scoring_elements": "0.7603", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861572", "reference_id": "1861572", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861572" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://security.gentoo.org/glsa/202007-60", "reference_id": "GLSA-202007-60", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-60" }, { "reference_url": "https://security.gentoo.org/glsa/202007-64", "reference_id": "GLSA-202007-64", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-64" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31", "reference_id": "mfsa2020-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-31" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35", "reference_id": "mfsa2020-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3229", "reference_id": "RHSA-2020:3229", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3229" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3233", "reference_id": "RHSA-2020:3233", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3233" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3241", "reference_id": "RHSA-2020:3241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3241" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3253", "reference_id": "RHSA-2020:3253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3254", "reference_id": "RHSA-2020:3254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3254" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3341", "reference_id": "RHSA-2020:3341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3342", "reference_id": "RHSA-2020:3342", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3342" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3343", "reference_id": "RHSA-2020:3343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3344", "reference_id": "RHSA-2020:3344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3344" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3345", "reference_id": "RHSA-2020:3345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3345" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15659" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtyr-jd5m-87c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63142?format=api", "vulnerability_id": "VCID-qhwf-9n5n-hbaa", "summary": "The code for downloading files did not properly take care of special characters,\nwhich led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65513", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65558", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15658" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861647", "reference_id": "1861647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861647" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15658" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhwf-9n5n-hbaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63143?format=api", "vulnerability_id": "VCID-wk26-kc1d-9qcy", "summary": "Firefox could be made to load attacker-supplied DLL files from the installation directory.\nThis required an attacker that is already capable of placing files in the installation directory.\n*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15657.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15657.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15657", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42035", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42062", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42026", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42055", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41992", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42054", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42076", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15657" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861648", "reference_id": "1861648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861648" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/417199?format=api", "purl": "pkg:apk/alpine/firefox-esr@78.1.0-r0?arch=x86_64&distroversion=v3.12&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" } ], "aliases": [ "CVE-2020-15657" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk26-kc1d-9qcy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@78.1.0-r0%3Farch=x86_64&distroversion=v3.12&reponame=community" }