Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/507729?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "type": "apk", "namespace": "alpine", "name": "thunderbird", "version": "68.9.0-r0", "qualifiers": { "arch": "loongarch64", "distroversion": "v3.21", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "68.10.0-r0", "latest_non_vulnerable_version": "128.5.0-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46233?format=api", "vulnerability_id": "VCID-axtu-gujv-rfgk", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12410.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.7377", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.7372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73732", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73736", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73728", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73679", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00783", "scoring_system": "epss", "scoring_elements": "0.73712", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843030", "reference_id": "1843030", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843030" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2378", "reference_id": "RHSA-2020:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2379", "reference_id": "RHSA-2020:2379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2380", "reference_id": "RHSA-2020:2380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2381", "reference_id": "RHSA-2020:2381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2382", "reference_id": "RHSA-2020:2382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2020-12410" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axtu-gujv-rfgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46230?format=api", "vulnerability_id": "VCID-hay5-714d-u7fd", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71123", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71109", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71092", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71071", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843313", "reference_id": "1843313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843313" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2378", "reference_id": "RHSA-2020:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2379", "reference_id": "RHSA-2020:2379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2380", "reference_id": "RHSA-2020:2380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2381", "reference_id": "RHSA-2020:2381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2382", "reference_id": "RHSA-2020:2382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2020-12405" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hay5-714d-u7fd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46228?format=api", "vulnerability_id": "VCID-jw36-uybs-cyg9", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12398.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12398.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49467", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49562", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49513", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49515", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00262", "scoring_system": "epss", "scoring_elements": "0.49541", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846556", "reference_id": "1846556", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1846556" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2020-12398" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jw36-uybs-cyg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61777?format=api", "vulnerability_id": "VCID-k2s2-zkua-8ydy", "summary": "NSS has an information disclosure vulnerability when handling DSA\n keys.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12399.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26718", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26836", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26839", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26794", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2693", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826177", "reference_id": "1826177", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826177" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752", "reference_id": "961752", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961752" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202007-49", "reference_id": "GLSA-202007-49", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3280", "reference_id": "RHSA-2020:3280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3280" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4397-1/", "reference_id": "USN-4397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4397-1/" }, { "reference_url": "https://usn.ubuntu.com/4397-2/", "reference_id": "USN-4397-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4397-2/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2020-12399" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2s2-zkua-8ydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46231?format=api", "vulnerability_id": "VCID-w89k-tvfx-cbez", "summary": "Multiple vulnerabilities have been found in Mozilla Thunderbird,\n the worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57733", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57704", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.5759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57675", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57696", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12398" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843312", "reference_id": "1843312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843312" }, { "reference_url": "https://security.archlinux.org/ASA-202006-1", "reference_id": "ASA-202006-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-1" }, { "reference_url": "https://security.archlinux.org/ASA-202006-4", "reference_id": "ASA-202006-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202006-4" }, { "reference_url": "https://security.archlinux.org/AVG-1173", "reference_id": "AVG-1173", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1173" }, { "reference_url": "https://security.archlinux.org/AVG-1179", "reference_id": "AVG-1179", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1179" }, { "reference_url": "https://security.gentoo.org/glsa/202006-07", "reference_id": "GLSA-202006-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-07" }, { "reference_url": "https://security.gentoo.org/glsa/202006-19", "reference_id": "GLSA-202006-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20", "reference_id": "mfsa2020-20", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-20" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21", "reference_id": "mfsa2020-21", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22", "reference_id": "mfsa2020-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2378", "reference_id": "RHSA-2020:2378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2379", "reference_id": "RHSA-2020:2379", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2379" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2380", "reference_id": "RHSA-2020:2380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2380" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2381", "reference_id": "RHSA-2020:2381", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2382", "reference_id": "RHSA-2020:2382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2611", "reference_id": "RHSA-2020:2611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2613", "reference_id": "RHSA-2020:2613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2614", "reference_id": "RHSA-2020:2614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2615", "reference_id": "RHSA-2020:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2616", "reference_id": "RHSA-2020:2616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2616" }, { "reference_url": "https://usn.ubuntu.com/4383-1/", "reference_id": "USN-4383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4383-1/" }, { "reference_url": "https://usn.ubuntu.com/4421-1/", "reference_id": "USN-4421-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4421-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/507729?format=api", "purl": "pkg:apk/alpine/thunderbird@68.9.0-r0?arch=loongarch64&distroversion=v3.21&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" } ], "aliases": [ "CVE-2020-12406" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w89k-tvfx-cbez" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@68.9.0-r0%3Farch=loongarch64&distroversion=v3.21&reponame=community" }