Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/457364?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "type": "apk", "namespace": "alpine", "name": "firefox", "version": "80.0-r0", "qualifiers": { "arch": "x86_64", "distroversion": "v3.20", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "81.0-r0", "latest_non_vulnerable_version": "119.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63136?format=api", "vulnerability_id": "VCID-e3j5-kyhm-7ye1", "summary": "When processing a MAR update file, after the signature has been validated, an invalid name length could result in a heap overflow, leading to memory corruption and potentially arbitrary code execution. Within Firefox as released by Mozilla, this issue is only exploitable with the Mozilla-controlled signing key.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15667.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75491", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75555", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75493", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00891", "scoring_system": "epss", "scoring_elements": "0.75547", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15667" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884474", "reference_id": "1884474", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1884474" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15667" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3j5-kyhm-7ye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47900?format=api", "vulnerability_id": "VCID-jtsz-m5jr-ebdc", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58885", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58899", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58781", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58846", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00371", "scoring_system": "epss", "scoring_elements": "0.58856", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15669" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872531", "reference_id": "1872531", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872531" }, { "reference_url": "https://security.gentoo.org/glsa/202008-16", "reference_id": "GLSA-202008-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-16" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37", "reference_id": "mfsa2020-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38", "reference_id": "mfsa2020-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40", "reference_id": "mfsa2020-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41", "reference_id": "mfsa2020-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3556", "reference_id": "RHSA-2020:3556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3558", "reference_id": "RHSA-2020:3558", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3558" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3631", "reference_id": "RHSA-2020:3631", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3631" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3632", "reference_id": "RHSA-2020:3632", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3632" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3633", "reference_id": "RHSA-2020:3633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3634", "reference_id": "RHSA-2020:3634", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3634" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3643", "reference_id": "RHSA-2020:3643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3643" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15664" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtsz-m5jr-ebdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39135?format=api", "vulnerability_id": "VCID-k4a4-f1as-x3bj", "summary": "NSS has multiple information disclosure vulnerabilities when\n handling secret key material.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12400.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12400", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35057", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35115", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.34934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35111", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853983", "reference_id": "1853983", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853983" }, { "reference_url": "https://security.gentoo.org/glsa/202008-08", "reference_id": "GLSA-202008-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4076", "reference_id": "RHSA-2020:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0538", "reference_id": "RHSA-2021:0538", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0538" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4455-1/", "reference_id": "USN-4455-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4455-1/" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-12400" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4a4-f1as-x3bj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63138?format=api", "vulnerability_id": "VCID-kbpr-dnqh-37fu", "summary": "Mozilla developers Jason Kratzer, Christian Holler, and Byron Campen reported memory safety bugs present in Firefox 79 and Firefox ESR 78.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.5967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00384", "scoring_system": "epss", "scoring_elements": "0.59634", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15670" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872533", "reference_id": "1872533", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872533" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38", "reference_id": "mfsa2020-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41", "reference_id": "mfsa2020-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15670" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbpr-dnqh-37fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63133?format=api", "vulnerability_id": "VCID-mx8t-s47w-wud5", "summary": "When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69005", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69049", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.6894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69007", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69027", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826187", "reference_id": "1826187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826187" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4076", "reference_id": "RHSA-2020:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0538", "reference_id": "RHSA-2021:0538", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0538" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4455-1/", "reference_id": "USN-4455-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4455-1/" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-6829" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mx8t-s47w-wud5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39137?format=api", "vulnerability_id": "VCID-rk7t-zjzg-eqar", "summary": "NSS has multiple information disclosure vulnerabilities when\n handling secret key material.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40544", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851294", "reference_id": "1851294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851294" }, { "reference_url": "https://security.gentoo.org/glsa/202008-08", "reference_id": "GLSA-202008-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202008-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4076", "reference_id": "RHSA-2020:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0538", "reference_id": "RHSA-2021:0538", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0538" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4455-1/", "reference_id": "USN-4455-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4455-1/" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-12401" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rk7t-zjzg-eqar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63135?format=api", "vulnerability_id": "VCID-rx46-z7x6-u3dc", "summary": "When trying to load a non-video in an audio/video context the exact status code (200, 302, 404, 500, 412, 403, etc.) was disclosed via the MediaError Message. This level of information leakage is inconsistent with the standardized onerror/onsuccess disclosure and can lead to inferring login status to services or device discovery on a local network among other attacks.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59043", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58922", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58997", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.58985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00373", "scoring_system": "epss", "scoring_elements": "0.59037", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15666" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rx46-z7x6-u3dc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63134?format=api", "vulnerability_id": "VCID-tvsh-whx8-6qdp", "summary": "Firefox did not reset the address bar after the beforeunload dialog was shown if the user chose to remain on the page. This could have resulted in an incorrect URL being shown when used in conjunction with other unexpected browser behaviors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40289", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40321", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40354", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40367", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15665" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885176", "reference_id": "1885176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885176" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15665" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvsh-whx8-6qdp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63132?format=api", "vulnerability_id": "VCID-vun4-z8ju-gbbc", "summary": "If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with administrative privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with system privileges.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82141", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.8213", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82156", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01674", "scoring_system": "epss", "scoring_elements": "0.82086", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15663" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872530", "reference_id": "1872530", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872530" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37", "reference_id": "mfsa2020-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38", "reference_id": "mfsa2020-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-38" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40", "reference_id": "mfsa2020-40", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-40" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41", "reference_id": "mfsa2020-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-41" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15663" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vun4-z8ju-gbbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63137?format=api", "vulnerability_id": "VCID-w1a1-6e1k-guh6", "summary": "A lock was missing when accessing a data structure and importing certificate information into the trust database.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42625", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42695", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42662", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00205", "scoring_system": "epss", "scoring_elements": "0.42714", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36", "reference_id": "mfsa2020-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39", "reference_id": "mfsa2020-39", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-39" }, { "reference_url": "https://usn.ubuntu.com/4474-1/", "reference_id": "USN-4474-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4474-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/457364?format=api", "purl": "pkg:apk/alpine/firefox@80.0-r0?arch=x86_64&distroversion=v3.20&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" } ], "aliases": [ "CVE-2020-15668" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1a1-6e1k-guh6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@80.0-r0%3Farch=x86_64&distroversion=v3.20&reponame=community" }