Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/firefox-bin@68.6.0
Typeebuild
Namespacewww-client
Namefirefox-bin
Version68.6.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version68.7.0
Latest_non_vulnerable_version137.0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1a64-m2w1-hkhs
vulnerability_id VCID-1a64-m2w1-hkhs
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6814
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74709
published_at 2026-04-18T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-04T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74624
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74655
published_at 2026-04-08T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-09T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74693
published_at 2026-04-11T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.74673
published_at 2026-04-12T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.74664
published_at 2026-04-13T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74701
published_at 2026-04-16T12:55:00Z
9
value 0.00837
scoring_system epss
scoring_elements 0.74619
published_at 2026-04-01T12:55:00Z
10
value 0.00837
scoring_system epss
scoring_elements 0.74623
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6814
2
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812205
reference_id 1812205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812205
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6814
reference_id CVE-2020-6814
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6814
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6814
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1a64-m2w1-hkhs
1
url VCID-2sd2-88zt-kkaq
vulnerability_id VCID-2sd2-88zt-kkaq
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6796
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75165
published_at 2026-04-18T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-12T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75154
published_at 2026-04-11T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-13T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75158
published_at 2026-04-16T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.75077
published_at 2026-04-01T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75079
published_at 2026-04-02T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75109
published_at 2026-04-04T12:55:00Z
8
value 0.00866
scoring_system epss
scoring_elements 0.75085
published_at 2026-04-07T12:55:00Z
9
value 0.00866
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6796
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801916
reference_id 1801916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801916
7
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
8
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
9
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
12
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
13
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
14
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
15
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
16
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
17
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6796
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2sd2-88zt-kkaq
2
url VCID-3smq-ax5u-ryd3
vulnerability_id VCID-3smq-ax5u-ryd3
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17012
reference_id
reference_type
scores
0
value 0.02152
scoring_system epss
scoring_elements 0.84276
published_at 2026-04-18T12:55:00Z
1
value 0.02152
scoring_system epss
scoring_elements 0.84237
published_at 2026-04-08T12:55:00Z
2
value 0.02152
scoring_system epss
scoring_elements 0.84243
published_at 2026-04-09T12:55:00Z
3
value 0.02152
scoring_system epss
scoring_elements 0.84261
published_at 2026-04-11T12:55:00Z
4
value 0.02152
scoring_system epss
scoring_elements 0.84256
published_at 2026-04-12T12:55:00Z
5
value 0.02152
scoring_system epss
scoring_elements 0.84253
published_at 2026-04-13T12:55:00Z
6
value 0.02152
scoring_system epss
scoring_elements 0.84275
published_at 2026-04-16T12:55:00Z
7
value 0.02152
scoring_system epss
scoring_elements 0.84183
published_at 2026-04-01T12:55:00Z
8
value 0.02152
scoring_system epss
scoring_elements 0.84196
published_at 2026-04-02T12:55:00Z
9
value 0.02152
scoring_system epss
scoring_elements 0.84214
published_at 2026-04-04T12:55:00Z
10
value 0.02152
scoring_system epss
scoring_elements 0.84215
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779437
reference_id 1779437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779437
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17012
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3
3
url VCID-4c3c-ygt3-kbg5
vulnerability_id VCID-4c3c-ygt3-kbg5
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6797
reference_id
reference_type
scores
0
value 0.0102
scoring_system epss
scoring_elements 0.77262
published_at 2026-04-18T12:55:00Z
1
value 0.0102
scoring_system epss
scoring_elements 0.77245
published_at 2026-04-11T12:55:00Z
2
value 0.0102
scoring_system epss
scoring_elements 0.77224
published_at 2026-04-12T12:55:00Z
3
value 0.0102
scoring_system epss
scoring_elements 0.7722
published_at 2026-04-13T12:55:00Z
4
value 0.0102
scoring_system epss
scoring_elements 0.7726
published_at 2026-04-16T12:55:00Z
5
value 0.0102
scoring_system epss
scoring_elements 0.77159
published_at 2026-04-01T12:55:00Z
6
value 0.0102
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-02T12:55:00Z
7
value 0.0102
scoring_system epss
scoring_elements 0.77195
published_at 2026-04-04T12:55:00Z
8
value 0.0102
scoring_system epss
scoring_elements 0.77176
published_at 2026-04-07T12:55:00Z
9
value 0.0102
scoring_system epss
scoring_elements 0.77209
published_at 2026-04-08T12:55:00Z
10
value 0.0102
scoring_system epss
scoring_elements 0.77217
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6797
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801917
reference_id 1801917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801917
4
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6797
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3c-ygt3-kbg5
4
url VCID-7hkk-2k6p-vyc7
vulnerability_id VCID-7hkk-2k6p-vyc7
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17024
reference_id
reference_type
scores
0
value 0.03276
scoring_system epss
scoring_elements 0.87192
published_at 2026-04-18T12:55:00Z
1
value 0.03276
scoring_system epss
scoring_elements 0.87168
published_at 2026-04-09T12:55:00Z
2
value 0.03276
scoring_system epss
scoring_elements 0.87181
published_at 2026-04-11T12:55:00Z
3
value 0.03276
scoring_system epss
scoring_elements 0.87176
published_at 2026-04-12T12:55:00Z
4
value 0.03276
scoring_system epss
scoring_elements 0.87171
published_at 2026-04-13T12:55:00Z
5
value 0.03276
scoring_system epss
scoring_elements 0.87187
published_at 2026-04-16T12:55:00Z
6
value 0.03276
scoring_system epss
scoring_elements 0.87116
published_at 2026-04-01T12:55:00Z
7
value 0.03276
scoring_system epss
scoring_elements 0.87126
published_at 2026-04-02T12:55:00Z
8
value 0.03276
scoring_system epss
scoring_elements 0.87143
published_at 2026-04-04T12:55:00Z
9
value 0.03276
scoring_system epss
scoring_elements 0.8714
published_at 2026-04-07T12:55:00Z
10
value 0.03276
scoring_system epss
scoring_elements 0.8716
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17024
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788727
reference_id 1788727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788727
8
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
9
reference_url https://security.archlinux.org/ASA-202001-4
reference_id ASA-202001-4
reference_type
scores
url https://security.archlinux.org/ASA-202001-4
10
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
11
reference_url https://security.archlinux.org/AVG-1086
reference_id AVG-1086
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1086
12
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
reference_id mfsa2020-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
reference_id mfsa2020-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
16
reference_url https://access.redhat.com/errata/RHSA-2020:0085
reference_id RHSA-2020:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0085
17
reference_url https://access.redhat.com/errata/RHSA-2020:0086
reference_id RHSA-2020:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0086
18
reference_url https://access.redhat.com/errata/RHSA-2020:0111
reference_id RHSA-2020:0111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0111
19
reference_url https://access.redhat.com/errata/RHSA-2020:0120
reference_id RHSA-2020:0120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0120
20
reference_url https://access.redhat.com/errata/RHSA-2020:0123
reference_id RHSA-2020:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0123
21
reference_url https://access.redhat.com/errata/RHSA-2020:0127
reference_id RHSA-2020:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0127
22
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
23
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
24
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
25
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
26
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17024
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hkk-2k6p-vyc7
5
url VCID-c4qs-a9kw-p3hc
vulnerability_id VCID-c4qs-a9kw-p3hc
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17017
reference_id
reference_type
scores
0
value 0.0263
scoring_system epss
scoring_elements 0.85712
published_at 2026-04-18T12:55:00Z
1
value 0.0263
scoring_system epss
scoring_elements 0.85677
published_at 2026-04-09T12:55:00Z
2
value 0.0263
scoring_system epss
scoring_elements 0.85692
published_at 2026-04-11T12:55:00Z
3
value 0.0263
scoring_system epss
scoring_elements 0.85688
published_at 2026-04-12T12:55:00Z
4
value 0.0263
scoring_system epss
scoring_elements 0.85684
published_at 2026-04-13T12:55:00Z
5
value 0.0263
scoring_system epss
scoring_elements 0.85706
published_at 2026-04-16T12:55:00Z
6
value 0.0263
scoring_system epss
scoring_elements 0.85608
published_at 2026-04-01T12:55:00Z
7
value 0.0263
scoring_system epss
scoring_elements 0.85621
published_at 2026-04-02T12:55:00Z
8
value 0.0263
scoring_system epss
scoring_elements 0.85639
published_at 2026-04-04T12:55:00Z
9
value 0.0263
scoring_system epss
scoring_elements 0.85645
published_at 2026-04-07T12:55:00Z
10
value 0.0263
scoring_system epss
scoring_elements 0.85665
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17017
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788724
reference_id 1788724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788724
8
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
9
reference_url https://security.archlinux.org/ASA-202001-4
reference_id ASA-202001-4
reference_type
scores
url https://security.archlinux.org/ASA-202001-4
10
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
11
reference_url https://security.archlinux.org/AVG-1086
reference_id AVG-1086
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1086
12
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
reference_id mfsa2020-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
reference_id mfsa2020-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
16
reference_url https://access.redhat.com/errata/RHSA-2020:0085
reference_id RHSA-2020:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0085
17
reference_url https://access.redhat.com/errata/RHSA-2020:0086
reference_id RHSA-2020:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0086
18
reference_url https://access.redhat.com/errata/RHSA-2020:0111
reference_id RHSA-2020:0111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0111
19
reference_url https://access.redhat.com/errata/RHSA-2020:0120
reference_id RHSA-2020:0120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0120
20
reference_url https://access.redhat.com/errata/RHSA-2020:0123
reference_id RHSA-2020:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0123
21
reference_url https://access.redhat.com/errata/RHSA-2020:0127
reference_id RHSA-2020:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0127
22
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
23
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
24
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
25
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
26
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17017
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4qs-a9kw-p3hc
6
url VCID-ex1b-2rdy-7qhw
vulnerability_id VCID-ex1b-2rdy-7qhw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17005
reference_id
reference_type
scores
0
value 0.02867
scoring_system epss
scoring_elements 0.86281
published_at 2026-04-18T12:55:00Z
1
value 0.02867
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
2
value 0.02867
scoring_system epss
scoring_elements 0.86253
published_at 2026-04-09T12:55:00Z
3
value 0.02867
scoring_system epss
scoring_elements 0.86267
published_at 2026-04-11T12:55:00Z
4
value 0.02867
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
5
value 0.02867
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
6
value 0.02867
scoring_system epss
scoring_elements 0.86276
published_at 2026-04-16T12:55:00Z
7
value 0.02867
scoring_system epss
scoring_elements 0.86199
published_at 2026-04-01T12:55:00Z
8
value 0.02867
scoring_system epss
scoring_elements 0.86209
published_at 2026-04-02T12:55:00Z
9
value 0.02867
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-04T12:55:00Z
10
value 0.02867
scoring_system epss
scoring_elements 0.86223
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17005
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779435
reference_id 1779435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779435
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17005
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw
7
url VCID-javq-3r82-73fq
vulnerability_id VCID-javq-3r82-73fq
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17022
reference_id
reference_type
scores
0
value 0.04633
scoring_system epss
scoring_elements 0.89296
published_at 2026-04-18T12:55:00Z
1
value 0.04633
scoring_system epss
scoring_elements 0.89276
published_at 2026-04-08T12:55:00Z
2
value 0.04633
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-09T12:55:00Z
3
value 0.04633
scoring_system epss
scoring_elements 0.8929
published_at 2026-04-11T12:55:00Z
4
value 0.04633
scoring_system epss
scoring_elements 0.89286
published_at 2026-04-12T12:55:00Z
5
value 0.04633
scoring_system epss
scoring_elements 0.89283
published_at 2026-04-13T12:55:00Z
6
value 0.04633
scoring_system epss
scoring_elements 0.89236
published_at 2026-04-01T12:55:00Z
7
value 0.04633
scoring_system epss
scoring_elements 0.89242
published_at 2026-04-02T12:55:00Z
8
value 0.04633
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-04T12:55:00Z
9
value 0.04633
scoring_system epss
scoring_elements 0.89259
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788726
reference_id 1788726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788726
8
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
9
reference_url https://security.archlinux.org/ASA-202001-4
reference_id ASA-202001-4
reference_type
scores
url https://security.archlinux.org/ASA-202001-4
10
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
11
reference_url https://security.archlinux.org/AVG-1086
reference_id AVG-1086
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1086
12
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
reference_id mfsa2020-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
reference_id mfsa2020-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
16
reference_url https://access.redhat.com/errata/RHSA-2020:0085
reference_id RHSA-2020:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0085
17
reference_url https://access.redhat.com/errata/RHSA-2020:0086
reference_id RHSA-2020:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0086
18
reference_url https://access.redhat.com/errata/RHSA-2020:0111
reference_id RHSA-2020:0111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0111
19
reference_url https://access.redhat.com/errata/RHSA-2020:0120
reference_id RHSA-2020:0120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0120
20
reference_url https://access.redhat.com/errata/RHSA-2020:0123
reference_id RHSA-2020:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0123
21
reference_url https://access.redhat.com/errata/RHSA-2020:0127
reference_id RHSA-2020:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0127
22
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
23
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
24
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
25
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
26
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17022
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-javq-3r82-73fq
8
url VCID-jr81-ed7a-aqcp
vulnerability_id VCID-jr81-ed7a-aqcp
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6811
reference_id
reference_type
scores
0
value 0.01364
scoring_system epss
scoring_elements 0.80211
published_at 2026-04-18T12:55:00Z
1
value 0.01843
scoring_system epss
scoring_elements 0.82916
published_at 2026-04-02T12:55:00Z
2
value 0.01843
scoring_system epss
scoring_elements 0.82929
published_at 2026-04-04T12:55:00Z
3
value 0.01843
scoring_system epss
scoring_elements 0.82925
published_at 2026-04-07T12:55:00Z
4
value 0.01843
scoring_system epss
scoring_elements 0.8295
published_at 2026-04-08T12:55:00Z
5
value 0.01843
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-09T12:55:00Z
6
value 0.01843
scoring_system epss
scoring_elements 0.82972
published_at 2026-04-11T12:55:00Z
7
value 0.01843
scoring_system epss
scoring_elements 0.82967
published_at 2026-04-12T12:55:00Z
8
value 0.01843
scoring_system epss
scoring_elements 0.82963
published_at 2026-04-13T12:55:00Z
9
value 0.01843
scoring_system epss
scoring_elements 0.83002
published_at 2026-04-16T12:55:00Z
10
value 0.01843
scoring_system epss
scoring_elements 0.82899
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6811
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812202
reference_id 1812202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812202
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6811
reference_id CVE-2020-6811
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6811
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6811
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jr81-ed7a-aqcp
9
url VCID-kr94-y6hg-d3hp
vulnerability_id VCID-kr94-y6hg-d3hp
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6799
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64799
published_at 2026-04-18T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64778
published_at 2026-04-12T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64751
published_at 2026-04-13T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64789
published_at 2026-04-16T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64672
published_at 2026-04-01T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64724
published_at 2026-04-02T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64752
published_at 2026-04-04T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.6471
published_at 2026-04-07T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64758
published_at 2026-04-08T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64773
published_at 2026-04-09T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.6479
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6799
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801919
reference_id 1801919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801919
4
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6799
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kr94-y6hg-d3hp
10
url VCID-m5h6-y3tw-eue6
vulnerability_id VCID-m5h6-y3tw-eue6
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-20503
reference_id
reference_type
scores
0
value 0.02474
scoring_system epss
scoring_elements 0.85299
published_at 2026-04-18T12:55:00Z
1
value 0.02474
scoring_system epss
scoring_elements 0.85237
published_at 2026-04-07T12:55:00Z
2
value 0.02474
scoring_system epss
scoring_elements 0.85259
published_at 2026-04-08T12:55:00Z
3
value 0.02474
scoring_system epss
scoring_elements 0.85267
published_at 2026-04-09T12:55:00Z
4
value 0.02474
scoring_system epss
scoring_elements 0.85282
published_at 2026-04-11T12:55:00Z
5
value 0.02474
scoring_system epss
scoring_elements 0.8528
published_at 2026-04-12T12:55:00Z
6
value 0.02474
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-13T12:55:00Z
7
value 0.02474
scoring_system epss
scoring_elements 0.85297
published_at 2026-04-16T12:55:00Z
8
value 0.02474
scoring_system epss
scoring_elements 0.85205
published_at 2026-04-01T12:55:00Z
9
value 0.02474
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-02T12:55:00Z
10
value 0.02474
scoring_system epss
scoring_elements 0.85235
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-20503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812203
reference_id 1812203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812203
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270
reference_id 953270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270
20
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
21
reference_url https://security.archlinux.org/ASA-202003-12
reference_id ASA-202003-12
reference_type
scores
url https://security.archlinux.org/ASA-202003-12
22
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
23
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
24
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
25
reference_url https://security.archlinux.org/AVG-1118
reference_id AVG-1118
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1118
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://access.redhat.com/errata/RHSA-2020:1270
reference_id RHSA-2020:1270
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1270
40
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
41
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
42
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-20503
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h6-y3tw-eue6
11
url VCID-pws7-8qmm-hfes
vulnerability_id VCID-pws7-8qmm-hfes
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17008
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.7498
published_at 2026-04-18T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74933
published_at 2026-04-08T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74945
published_at 2026-04-09T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74968
published_at 2026-04-11T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-12T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74936
published_at 2026-04-13T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74973
published_at 2026-04-16T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74896
published_at 2026-04-01T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.74897
published_at 2026-04-02T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-04T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.74899
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779431
reference_id 1779431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779431
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17008
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes
12
url VCID-rszh-1c16-47ah
vulnerability_id VCID-rszh-1c16-47ah
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
reference_id
reference_type
scores
0
value 0.01646
scoring_system epss
scoring_elements 0.82008
published_at 2026-04-18T12:55:00Z
1
value 0.01646
scoring_system epss
scoring_elements 0.81935
published_at 2026-04-07T12:55:00Z
2
value 0.01646
scoring_system epss
scoring_elements 0.81962
published_at 2026-04-08T12:55:00Z
3
value 0.01646
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-09T12:55:00Z
4
value 0.01646
scoring_system epss
scoring_elements 0.81989
published_at 2026-04-11T12:55:00Z
5
value 0.01646
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-12T12:55:00Z
6
value 0.01646
scoring_system epss
scoring_elements 0.81972
published_at 2026-04-13T12:55:00Z
7
value 0.01646
scoring_system epss
scoring_elements 0.81905
published_at 2026-04-01T12:55:00Z
8
value 0.01646
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-02T12:55:00Z
9
value 0.01646
scoring_system epss
scoring_elements 0.81939
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6798
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
reference_id 1801918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801918
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6798
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah
13
url VCID-t4eb-c363-u7hc
vulnerability_id VCID-t4eb-c363-u7hc
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6805
reference_id
reference_type
scores
0
value 0.00796
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-18T12:55:00Z
1
value 0.00853
scoring_system epss
scoring_elements 0.74889
published_at 2026-04-02T12:55:00Z
2
value 0.00853
scoring_system epss
scoring_elements 0.74917
published_at 2026-04-04T12:55:00Z
3
value 0.00853
scoring_system epss
scoring_elements 0.74891
published_at 2026-04-07T12:55:00Z
4
value 0.00853
scoring_system epss
scoring_elements 0.74924
published_at 2026-04-08T12:55:00Z
5
value 0.00853
scoring_system epss
scoring_elements 0.74937
published_at 2026-04-09T12:55:00Z
6
value 0.00853
scoring_system epss
scoring_elements 0.74959
published_at 2026-04-11T12:55:00Z
7
value 0.00853
scoring_system epss
scoring_elements 0.74938
published_at 2026-04-12T12:55:00Z
8
value 0.00853
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-13T12:55:00Z
9
value 0.00853
scoring_system epss
scoring_elements 0.74965
published_at 2026-04-16T12:55:00Z
10
value 0.00853
scoring_system epss
scoring_elements 0.74887
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6805
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812199
reference_id 1812199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812199
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6805
reference_id CVE-2020-6805
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6805
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4eb-c363-u7hc
14
url VCID-vzb9-aeqz-hybr
vulnerability_id VCID-vzb9-aeqz-hybr
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74195
published_at 2026-04-18T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-08T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-09T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74174
published_at 2026-04-11T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74155
published_at 2026-04-12T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74149
published_at 2026-04-13T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74186
published_at 2026-04-16T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-01T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-02T12:55:00Z
9
value 0.00806
scoring_system epss
scoring_elements 0.74133
published_at 2026-04-04T12:55:00Z
10
value 0.00806
scoring_system epss
scoring_elements 0.74105
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-11745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
reference_id 1774831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1774831
6
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
7
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
8
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
9
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
10
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
11
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
12
reference_url https://security.gentoo.org/glsa/202003-37
reference_id GLSA-202003-37
reference_type
scores
url https://security.gentoo.org/glsa/202003-37
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
16
reference_url https://access.redhat.com/errata/RHSA-2019:4114
reference_id RHSA-2019:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4114
17
reference_url https://access.redhat.com/errata/RHSA-2019:4152
reference_id RHSA-2019:4152
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4152
18
reference_url https://access.redhat.com/errata/RHSA-2019:4190
reference_id RHSA-2019:4190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4190
19
reference_url https://access.redhat.com/errata/RHSA-2020:0243
reference_id RHSA-2020:0243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0243
20
reference_url https://access.redhat.com/errata/RHSA-2020:0466
reference_id RHSA-2020:0466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0466
21
reference_url https://access.redhat.com/errata/RHSA-2020:1267
reference_id RHSA-2020:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1267
22
reference_url https://access.redhat.com/errata/RHSA-2020:1345
reference_id RHSA-2020:1345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1345
23
reference_url https://access.redhat.com/errata/RHSA-2020:1461
reference_id RHSA-2020:1461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1461
24
reference_url https://usn.ubuntu.com/4203-1/
reference_id USN-4203-1
reference_type
scores
url https://usn.ubuntu.com/4203-1/
25
reference_url https://usn.ubuntu.com/4203-2/
reference_id USN-4203-2
reference_type
scores
url https://usn.ubuntu.com/4203-2/
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-11745
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr
15
url VCID-wpm1-y59u-zkgu
vulnerability_id VCID-wpm1-y59u-zkgu
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6807
reference_id
reference_type
scores
0
value 0.00779
scoring_system epss
scoring_elements 0.73711
published_at 2026-04-16T12:55:00Z
1
value 0.00779
scoring_system epss
scoring_elements 0.73668
published_at 2026-04-13T12:55:00Z
2
value 0.00779
scoring_system epss
scoring_elements 0.73616
published_at 2026-04-01T12:55:00Z
3
value 0.00779
scoring_system epss
scoring_elements 0.73676
published_at 2026-04-12T12:55:00Z
4
value 0.00779
scoring_system epss
scoring_elements 0.73694
published_at 2026-04-11T12:55:00Z
5
value 0.00779
scoring_system epss
scoring_elements 0.73671
published_at 2026-04-09T12:55:00Z
6
value 0.00779
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-08T12:55:00Z
7
value 0.00779
scoring_system epss
scoring_elements 0.73622
published_at 2026-04-07T12:55:00Z
8
value 0.00779
scoring_system epss
scoring_elements 0.73651
published_at 2026-04-04T12:55:00Z
9
value 0.00779
scoring_system epss
scoring_elements 0.73627
published_at 2026-04-02T12:55:00Z
10
value 0.00786
scoring_system epss
scoring_elements 0.73856
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6807
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812201
reference_id 1812201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812201
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6807
reference_id CVE-2020-6807
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6807
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6807
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm1-y59u-zkgu
16
url VCID-x12h-hqf2-37cc
vulnerability_id VCID-x12h-hqf2-37cc
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17016
reference_id
reference_type
scores
0
value 0.03465
scoring_system epss
scoring_elements 0.87551
published_at 2026-04-18T12:55:00Z
1
value 0.03465
scoring_system epss
scoring_elements 0.87532
published_at 2026-04-09T12:55:00Z
2
value 0.03465
scoring_system epss
scoring_elements 0.87544
published_at 2026-04-11T12:55:00Z
3
value 0.03465
scoring_system epss
scoring_elements 0.87539
published_at 2026-04-12T12:55:00Z
4
value 0.03465
scoring_system epss
scoring_elements 0.87536
published_at 2026-04-13T12:55:00Z
5
value 0.03465
scoring_system epss
scoring_elements 0.8755
published_at 2026-04-16T12:55:00Z
6
value 0.03465
scoring_system epss
scoring_elements 0.8748
published_at 2026-04-01T12:55:00Z
7
value 0.03465
scoring_system epss
scoring_elements 0.8749
published_at 2026-04-02T12:55:00Z
8
value 0.03465
scoring_system epss
scoring_elements 0.87504
published_at 2026-04-04T12:55:00Z
9
value 0.03465
scoring_system epss
scoring_elements 0.87506
published_at 2026-04-07T12:55:00Z
10
value 0.03465
scoring_system epss
scoring_elements 0.87525
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1788723
reference_id 1788723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1788723
8
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
9
reference_url https://security.archlinux.org/ASA-202001-4
reference_id ASA-202001-4
reference_type
scores
url https://security.archlinux.org/ASA-202001-4
10
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
11
reference_url https://security.archlinux.org/AVG-1086
reference_id AVG-1086
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1086
12
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
reference_id mfsa2020-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-02
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
reference_id mfsa2020-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
16
reference_url https://access.redhat.com/errata/RHSA-2020:0085
reference_id RHSA-2020:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0085
17
reference_url https://access.redhat.com/errata/RHSA-2020:0086
reference_id RHSA-2020:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0086
18
reference_url https://access.redhat.com/errata/RHSA-2020:0111
reference_id RHSA-2020:0111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0111
19
reference_url https://access.redhat.com/errata/RHSA-2020:0120
reference_id RHSA-2020:0120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0120
20
reference_url https://access.redhat.com/errata/RHSA-2020:0123
reference_id RHSA-2020:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0123
21
reference_url https://access.redhat.com/errata/RHSA-2020:0127
reference_id RHSA-2020:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0127
22
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
23
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
24
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
25
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
26
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17016
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x12h-hqf2-37cc
17
url VCID-x4vq-y6b6-dqf6
vulnerability_id VCID-x4vq-y6b6-dqf6
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6806
reference_id
reference_type
scores
0
value 0.02611
scoring_system epss
scoring_elements 0.85669
published_at 2026-04-18T12:55:00Z
1
value 0.03504
scoring_system epss
scoring_elements 0.87569
published_at 2026-04-02T12:55:00Z
2
value 0.03504
scoring_system epss
scoring_elements 0.87582
published_at 2026-04-04T12:55:00Z
3
value 0.03504
scoring_system epss
scoring_elements 0.87585
published_at 2026-04-07T12:55:00Z
4
value 0.03504
scoring_system epss
scoring_elements 0.87604
published_at 2026-04-08T12:55:00Z
5
value 0.03504
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-09T12:55:00Z
6
value 0.03504
scoring_system epss
scoring_elements 0.87622
published_at 2026-04-11T12:55:00Z
7
value 0.03504
scoring_system epss
scoring_elements 0.87617
published_at 2026-04-12T12:55:00Z
8
value 0.03504
scoring_system epss
scoring_elements 0.87614
published_at 2026-04-13T12:55:00Z
9
value 0.03504
scoring_system epss
scoring_elements 0.87628
published_at 2026-04-16T12:55:00Z
10
value 0.03504
scoring_system epss
scoring_elements 0.87559
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6806
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
14
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812200
reference_id 1812200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812200
16
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
17
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
18
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
19
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6806
reference_id CVE-2020-6806
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2020-6806
27
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
28
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
32
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
33
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
34
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
35
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
36
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
37
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
38
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
39
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
40
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
41
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
42
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6806
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4vq-y6b6-dqf6
18
url VCID-y8vr-48q8-a3aj
vulnerability_id VCID-y8vr-48q8-a3aj
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
reference_id
reference_type
scores
0
value 0.0125
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-18T12:55:00Z
1
value 0.0125
scoring_system epss
scoring_elements 0.79298
published_at 2026-04-07T12:55:00Z
2
value 0.0125
scoring_system epss
scoring_elements 0.79323
published_at 2026-04-08T12:55:00Z
3
value 0.0125
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-09T12:55:00Z
4
value 0.0125
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-16T12:55:00Z
5
value 0.0125
scoring_system epss
scoring_elements 0.79341
published_at 2026-04-12T12:55:00Z
6
value 0.0125
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-13T12:55:00Z
7
value 0.0125
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-01T12:55:00Z
8
value 0.0125
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-02T12:55:00Z
9
value 0.0125
scoring_system epss
scoring_elements 0.79312
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
reference_id 1801920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1801920
11
reference_url https://security.archlinux.org/ASA-202002-5
reference_id ASA-202002-5
reference_type
scores
url https://security.archlinux.org/ASA-202002-5
12
reference_url https://security.archlinux.org/ASA-202002-9
reference_id ASA-202002-9
reference_type
scores
url https://security.archlinux.org/ASA-202002-9
13
reference_url https://security.archlinux.org/AVG-1096
reference_id AVG-1096
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1096
14
reference_url https://security.archlinux.org/AVG-1099
reference_id AVG-1099
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1099
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
reference_id mfsa2020-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-05
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
reference_id mfsa2020-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-06
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
reference_id mfsa2020-07
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-07
20
reference_url https://access.redhat.com/errata/RHSA-2020:0512
reference_id RHSA-2020:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0512
21
reference_url https://access.redhat.com/errata/RHSA-2020:0519
reference_id RHSA-2020:0519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0519
22
reference_url https://access.redhat.com/errata/RHSA-2020:0520
reference_id RHSA-2020:0520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0520
23
reference_url https://access.redhat.com/errata/RHSA-2020:0521
reference_id RHSA-2020:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0521
24
reference_url https://access.redhat.com/errata/RHSA-2020:0565
reference_id RHSA-2020:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0565
25
reference_url https://access.redhat.com/errata/RHSA-2020:0574
reference_id RHSA-2020:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0574
26
reference_url https://access.redhat.com/errata/RHSA-2020:0576
reference_id RHSA-2020:0576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0576
27
reference_url https://access.redhat.com/errata/RHSA-2020:0577
reference_id RHSA-2020:0577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0577
28
reference_url https://usn.ubuntu.com/4278-1/
reference_id USN-4278-1
reference_type
scores
url https://usn.ubuntu.com/4278-1/
29
reference_url https://usn.ubuntu.com/4278-2/
reference_id USN-4278-2
reference_type
scores
url https://usn.ubuntu.com/4278-2/
30
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6800
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj
19
url VCID-yr3c-1cqv-n3bw
vulnerability_id VCID-yr3c-1cqv-n3bw
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6812
reference_id
reference_type
scores
0
value 0.00581
scoring_system epss
scoring_elements 0.68959
published_at 2026-04-18T12:55:00Z
1
value 0.00581
scoring_system epss
scoring_elements 0.6888
published_at 2026-04-04T12:55:00Z
2
value 0.00581
scoring_system epss
scoring_elements 0.6886
published_at 2026-04-07T12:55:00Z
3
value 0.00581
scoring_system epss
scoring_elements 0.6891
published_at 2026-04-08T12:55:00Z
4
value 0.00581
scoring_system epss
scoring_elements 0.68929
published_at 2026-04-09T12:55:00Z
5
value 0.00581
scoring_system epss
scoring_elements 0.68951
published_at 2026-04-11T12:55:00Z
6
value 0.00581
scoring_system epss
scoring_elements 0.68937
published_at 2026-04-12T12:55:00Z
7
value 0.00581
scoring_system epss
scoring_elements 0.68908
published_at 2026-04-13T12:55:00Z
8
value 0.00581
scoring_system epss
scoring_elements 0.68949
published_at 2026-04-16T12:55:00Z
9
value 0.00581
scoring_system epss
scoring_elements 0.68842
published_at 2026-04-01T12:55:00Z
10
value 0.00581
scoring_system epss
scoring_elements 0.68859
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6812
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://www.mozilla.org/security/advisories/mfsa2020-08/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-08/
12
reference_url https://www.mozilla.org/security/advisories/mfsa2020-09/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-09/
13
reference_url https://www.mozilla.org/security/advisories/mfsa2020-10/
reference_id
reference_type
scores
url https://www.mozilla.org/security/advisories/mfsa2020-10/
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812204
reference_id 1812204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812204
15
reference_url https://security.archlinux.org/ASA-202003-11
reference_id ASA-202003-11
reference_type
scores
url https://security.archlinux.org/ASA-202003-11
16
reference_url https://security.archlinux.org/ASA-202003-8
reference_id ASA-202003-8
reference_type
scores
url https://security.archlinux.org/ASA-202003-8
17
reference_url https://security.archlinux.org/AVG-1112
reference_id AVG-1112
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1112
18
reference_url https://security.archlinux.org/AVG-1115
reference_id AVG-1115
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1115
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6812
reference_id CVE-2020-6812
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-6812
26
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
27
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
reference_id mfsa2020-08
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-08
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
reference_id mfsa2020-09
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-09
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
reference_id mfsa2020-10
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-10
31
reference_url https://access.redhat.com/errata/RHSA-2020:0815
reference_id RHSA-2020:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0815
32
reference_url https://access.redhat.com/errata/RHSA-2020:0816
reference_id RHSA-2020:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0816
33
reference_url https://access.redhat.com/errata/RHSA-2020:0819
reference_id RHSA-2020:0819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0819
34
reference_url https://access.redhat.com/errata/RHSA-2020:0820
reference_id RHSA-2020:0820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0820
35
reference_url https://access.redhat.com/errata/RHSA-2020:0905
reference_id RHSA-2020:0905
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0905
36
reference_url https://access.redhat.com/errata/RHSA-2020:0914
reference_id RHSA-2020:0914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0914
37
reference_url https://access.redhat.com/errata/RHSA-2020:0918
reference_id RHSA-2020:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0918
38
reference_url https://access.redhat.com/errata/RHSA-2020:0919
reference_id RHSA-2020:0919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0919
39
reference_url https://usn.ubuntu.com/4299-1/
reference_id USN-4299-1
reference_type
scores
url https://usn.ubuntu.com/4299-1/
40
reference_url https://usn.ubuntu.com/4328-1/
reference_id USN-4328-1
reference_type
scores
url https://usn.ubuntu.com/4328-1/
41
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2020-6812
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yr3c-1cqv-n3bw
20
url VCID-zbpq-qcww-6yg1
vulnerability_id VCID-zbpq-qcww-6yg1
summary
Multiple vulnerabilities have been found in Mozilla Firefox, the
    worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17026
reference_id
reference_type
scores
0
value 0.5907
scoring_system epss
scoring_elements 0.98235
published_at 2026-04-18T12:55:00Z
1
value 0.5907
scoring_system epss
scoring_elements 0.98233
published_at 2026-04-16T12:55:00Z
2
value 0.64805
scoring_system epss
scoring_elements 0.98457
published_at 2026-04-07T12:55:00Z
3
value 0.64805
scoring_system epss
scoring_elements 0.98453
published_at 2026-04-02T12:55:00Z
4
value 0.64805
scoring_system epss
scoring_elements 0.98451
published_at 2026-04-01T12:55:00Z
5
value 0.64805
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-12T12:55:00Z
6
value 0.64805
scoring_system epss
scoring_elements 0.98465
published_at 2026-04-13T12:55:00Z
7
value 0.64805
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-09T12:55:00Z
8
value 0.64805
scoring_system epss
scoring_elements 0.98461
published_at 2026-04-08T12:55:00Z
9
value 0.64805
scoring_system epss
scoring_elements 0.98456
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789214
reference_id 1789214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789214
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452
reference_id 948452
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452
9
reference_url https://security.archlinux.org/ASA-202001-3
reference_id ASA-202001-3
reference_type
scores
url https://security.archlinux.org/ASA-202001-3
10
reference_url https://security.archlinux.org/ASA-202001-4
reference_id ASA-202001-4
reference_type
scores
url https://security.archlinux.org/ASA-202001-4
11
reference_url https://security.archlinux.org/AVG-1085
reference_id AVG-1085
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1085
12
reference_url https://security.archlinux.org/AVG-1086
reference_id AVG-1086
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1086
13
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js
reference_id CVE-2019-17026
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js
14
reference_url http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html
reference_id Firefox-72-IonMonkey-JIT-Type-Confusion.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html
15
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url https://security.gentoo.org/glsa/202003-02
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-03
reference_id mfsa2020-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-03
17
reference_url https://www.mozilla.org/security/advisories/mfsa2020-03/
reference_id mfsa2020-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url https://www.mozilla.org/security/advisories/mfsa2020-03/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
reference_id mfsa2020-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-04
19
reference_url https://www.mozilla.org/security/advisories/mfsa2020-04/
reference_id mfsa2020-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url https://www.mozilla.org/security/advisories/mfsa2020-04/
20
reference_url https://access.redhat.com/errata/RHSA-2020:0085
reference_id RHSA-2020:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0085
21
reference_url https://access.redhat.com/errata/RHSA-2020:0086
reference_id RHSA-2020:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0086
22
reference_url https://access.redhat.com/errata/RHSA-2020:0111
reference_id RHSA-2020:0111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0111
23
reference_url https://access.redhat.com/errata/RHSA-2020:0120
reference_id RHSA-2020:0120
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0120
24
reference_url https://access.redhat.com/errata/RHSA-2020:0123
reference_id RHSA-2020:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0123
25
reference_url https://access.redhat.com/errata/RHSA-2020:0127
reference_id RHSA-2020:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0127
26
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
27
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1607443
reference_id show_bug.cgi?id=1607443
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1607443
29
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
30
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
31
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17026
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbpq-qcww-6yg1
21
url VCID-zh2m-qyw5-dkgn
vulnerability_id VCID-zh2m-qyw5-dkgn
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17011
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79967
published_at 2026-04-18T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79907
published_at 2026-04-07T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79935
published_at 2026-04-08T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-09T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-11T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-12T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79939
published_at 2026-04-13T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-01T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79898
published_at 2026-04-02T12:55:00Z
9
value 0.01329
scoring_system epss
scoring_elements 0.79919
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17011
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779436
reference_id 1779436
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779436
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17011
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn
22
url VCID-zstj-sux9-ubdd
vulnerability_id VCID-zstj-sux9-ubdd
summary
Multiple vulnerabilities have been found in Mozilla Thunderbird,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17010
reference_id
reference_type
scores
0
value 0.01329
scoring_system epss
scoring_elements 0.79967
published_at 2026-04-18T12:55:00Z
1
value 0.01329
scoring_system epss
scoring_elements 0.79907
published_at 2026-04-07T12:55:00Z
2
value 0.01329
scoring_system epss
scoring_elements 0.79935
published_at 2026-04-08T12:55:00Z
3
value 0.01329
scoring_system epss
scoring_elements 0.79943
published_at 2026-04-09T12:55:00Z
4
value 0.01329
scoring_system epss
scoring_elements 0.79963
published_at 2026-04-11T12:55:00Z
5
value 0.01329
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-12T12:55:00Z
6
value 0.01329
scoring_system epss
scoring_elements 0.79939
published_at 2026-04-13T12:55:00Z
7
value 0.01329
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-01T12:55:00Z
8
value 0.01329
scoring_system epss
scoring_elements 0.79898
published_at 2026-04-02T12:55:00Z
9
value 0.01329
scoring_system epss
scoring_elements 0.79919
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1779434
reference_id 1779434
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1779434
9
reference_url https://security.archlinux.org/ASA-201912-1
reference_id ASA-201912-1
reference_type
scores
url https://security.archlinux.org/ASA-201912-1
10
reference_url https://security.archlinux.org/ASA-201912-2
reference_id ASA-201912-2
reference_type
scores
url https://security.archlinux.org/ASA-201912-2
11
reference_url https://security.archlinux.org/AVG-1071
reference_id AVG-1071
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1071
12
reference_url https://security.archlinux.org/AVG-1072
reference_id AVG-1072
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1072
13
reference_url https://security.gentoo.org/glsa/202003-02
reference_id GLSA-202003-02
reference_type
scores
url https://security.gentoo.org/glsa/202003-02
14
reference_url https://security.gentoo.org/glsa/202003-10
reference_id GLSA-202003-10
reference_type
scores
url https://security.gentoo.org/glsa/202003-10
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
reference_id mfsa2019-36
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-36
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
reference_id mfsa2019-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-37
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
reference_id mfsa2019-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2019-38
18
reference_url https://access.redhat.com/errata/RHSA-2019:4107
reference_id RHSA-2019:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4107
19
reference_url https://access.redhat.com/errata/RHSA-2019:4108
reference_id RHSA-2019:4108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4108
20
reference_url https://access.redhat.com/errata/RHSA-2019:4111
reference_id RHSA-2019:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4111
21
reference_url https://access.redhat.com/errata/RHSA-2019:4148
reference_id RHSA-2019:4148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4148
22
reference_url https://access.redhat.com/errata/RHSA-2019:4195
reference_id RHSA-2019:4195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4195
23
reference_url https://access.redhat.com/errata/RHSA-2019:4205
reference_id RHSA-2019:4205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4205
24
reference_url https://access.redhat.com/errata/RHSA-2020:0292
reference_id RHSA-2020:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0292
25
reference_url https://access.redhat.com/errata/RHSA-2020:0295
reference_id RHSA-2020:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0295
26
reference_url https://usn.ubuntu.com/4216-1/
reference_id USN-4216-1
reference_type
scores
url https://usn.ubuntu.com/4216-1/
27
reference_url https://usn.ubuntu.com/4216-2/
reference_id USN-4216-2
reference_type
scores
url https://usn.ubuntu.com/4216-2/
28
reference_url https://usn.ubuntu.com/4241-1/
reference_id USN-4241-1
reference_type
scores
url https://usn.ubuntu.com/4241-1/
29
reference_url https://usn.ubuntu.com/4335-1/
reference_id USN-4335-1
reference_type
scores
url https://usn.ubuntu.com/4335-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@68.6.0
purl pkg:ebuild/www-client/firefox-bin@68.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0
aliases CVE-2019-17010
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0