Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Namethunderbird
Version68.5.0-r0
Qualifiers
arch loongarch64
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version68.6.0-r0
Latest_non_vulnerable_version128.5.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-16ta-j6p4-afgn
vulnerability_id VCID-16ta-j6p4-afgn
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6794
reference_id
reference_type
scores
0
value 0.00399
scoring_system epss
scoring_elements 0.60538
published_at 2026-04-01T12:55:00Z
1
value 0.00399
scoring_system epss
scoring_elements 0.6071
published_at 2026-04-16T12:55:00Z
2
value 0.00399
scoring_system epss
scoring_elements 0.60688
published_at 2026-04-12T12:55:00Z
3
value 0.00399
scoring_system epss
scoring_elements 0.60668
published_at 2026-04-13T12:55:00Z
4
value 0.00399
scoring_system epss
scoring_elements 0.60612
published_at 2026-04-02T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60642
published_at 2026-04-04T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.60613
published_at 2026-04-07T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60662
published_at 2026-04-08T12:55:00Z
8
value 0.00399
scoring_system epss
scoring_elements 0.60677
published_at 2026-04-09T12:55:00Z
9
value 0.00399
scoring_system epss
scoring_elements 0.60702
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801956
reference_id 1801956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801956
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6794
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16ta-j6p4-afgn
1
url VCID-23mb-npay-uqaq
vulnerability_id VCID-23mb-npay-uqaq
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6793
reference_id
reference_type
scores
0
value 0.00803
scoring_system epss
scoring_elements 0.7405
published_at 2026-04-01T12:55:00Z
1
value 0.00803
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-16T12:55:00Z
2
value 0.00803
scoring_system epss
scoring_elements 0.74104
published_at 2026-04-12T12:55:00Z
3
value 0.00803
scoring_system epss
scoring_elements 0.74098
published_at 2026-04-13T12:55:00Z
4
value 0.00803
scoring_system epss
scoring_elements 0.74056
published_at 2026-04-02T12:55:00Z
5
value 0.00803
scoring_system epss
scoring_elements 0.74082
published_at 2026-04-04T12:55:00Z
6
value 0.00803
scoring_system epss
scoring_elements 0.74053
published_at 2026-04-07T12:55:00Z
7
value 0.00803
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-08T12:55:00Z
8
value 0.00803
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-09T12:55:00Z
9
value 0.00803
scoring_system epss
scoring_elements 0.74122
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6793
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801955
reference_id 1801955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801955
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6793
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23mb-npay-uqaq
2
url VCID-4c3c-ygt3-kbg5
vulnerability_id VCID-4c3c-ygt3-kbg5
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6797
reference_id
reference_type
scores
0
value 0.0102
scoring_system epss
scoring_elements 0.7726
published_at 2026-04-16T12:55:00Z
1
value 0.0102
scoring_system epss
scoring_elements 0.77217
published_at 2026-04-09T12:55:00Z
2
value 0.0102
scoring_system epss
scoring_elements 0.77245
published_at 2026-04-11T12:55:00Z
3
value 0.0102
scoring_system epss
scoring_elements 0.77224
published_at 2026-04-12T12:55:00Z
4
value 0.0102
scoring_system epss
scoring_elements 0.7722
published_at 2026-04-13T12:55:00Z
5
value 0.0102
scoring_system epss
scoring_elements 0.77159
published_at 2026-04-01T12:55:00Z
6
value 0.0102
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-02T12:55:00Z
7
value 0.0102
scoring_system epss
scoring_elements 0.77195
published_at 2026-04-04T12:55:00Z
8
value 0.0102
scoring_system epss
scoring_elements 0.77176
published_at 2026-04-07T12:55:00Z
9
value 0.0102
scoring_system epss
scoring_elements 0.77209
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6797
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801917
reference_id 1801917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801917
4
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6797
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3c-ygt3-kbg5
3
url VCID-9c8c-d9u8-83bx
vulnerability_id VCID-9c8c-d9u8-83bx
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6795
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.7168
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71761
published_at 2026-04-16T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-12T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71718
published_at 2026-04-13T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71686
published_at 2026-04-02T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71704
published_at 2026-04-04T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-07T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71717
published_at 2026-04-08T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71728
published_at 2026-04-09T12:55:00Z
9
value 0.00688
scoring_system epss
scoring_elements 0.71752
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801957
reference_id 1801957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801957
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6795
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9c8c-d9u8-83bx
4
url VCID-cy4f-4pvz-23fh
vulnerability_id VCID-cy4f-4pvz-23fh
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6792
reference_id
reference_type
scores
0
value 0.00953
scoring_system epss
scoring_elements 0.76346
published_at 2026-04-01T12:55:00Z
1
value 0.00953
scoring_system epss
scoring_elements 0.76444
published_at 2026-04-16T12:55:00Z
2
value 0.00953
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-12T12:55:00Z
3
value 0.00953
scoring_system epss
scoring_elements 0.76404
published_at 2026-04-13T12:55:00Z
4
value 0.00953
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-02T12:55:00Z
5
value 0.00953
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-04T12:55:00Z
6
value 0.00953
scoring_system epss
scoring_elements 0.76359
published_at 2026-04-07T12:55:00Z
7
value 0.00953
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-08T12:55:00Z
8
value 0.00953
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-09T12:55:00Z
9
value 0.00953
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801958
reference_id 1801958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801958
9
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
10
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
13
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
14
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
15
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
16
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
17
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
18
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6792
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cy4f-4pvz-23fh
5
url VCID-rszh-1c16-47ah
vulnerability_id VCID-rszh-1c16-47ah
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
reference_id
reference_type
scores
0
value 0.01646
scoring_system epss
scoring_elements 0.82008
published_at 2026-04-16T12:55:00Z
1
value 0.01646
scoring_system epss
scoring_elements 0.81935
published_at 2026-04-07T12:55:00Z
2
value 0.01646
scoring_system epss
scoring_elements 0.81962
published_at 2026-04-08T12:55:00Z
3
value 0.01646
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-09T12:55:00Z
4
value 0.01646
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-11T12:55:00Z
5
value 0.01646
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-12T12:55:00Z
6
value 0.01646
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-13T12:55:00Z
7
value 0.01646
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-01T12:55:00Z
8
value 0.01646
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-02T12:55:00Z
9
value 0.01646
scoring_system epss
scoring_elements 0.81939
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
reference_id 1801918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah
6
url VCID-y8vr-48q8-a3aj
vulnerability_id VCID-y8vr-48q8-a3aj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
reference_id
reference_type
scores
0
value 0.0125
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-13T12:55:00Z
1
value 0.0125
scoring_system epss
scoring_elements 0.79312
published_at 2026-04-04T12:55:00Z
2
value 0.0125
scoring_system epss
scoring_elements 0.79298
published_at 2026-04-07T12:55:00Z
3
value 0.0125
scoring_system epss
scoring_elements 0.79323
published_at 2026-04-08T12:55:00Z
4
value 0.0125
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-09T12:55:00Z
5
value 0.0125
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-16T12:55:00Z
6
value 0.0125
scoring_system epss
scoring_elements 0.79341
published_at 2026-04-12T12:55:00Z
7
value 0.0125
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-01T12:55:00Z
8
value 0.0125
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
reference_id 1801920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/thunderbird@68.5.0-r0?arch=loongarch64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community
aliases CVE-2020-6800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.5.0-r0%3Farch=loongarch64&distroversion=v3.22&reponame=community