{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","type":"alpm","namespace":"archlinux","name":"firefox","version":"75.0-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"76.0-1","latest_non_vulnerable_version":"101.0-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35109?format=json","vulnerability_id":"VCID-8hqw-tgvq-pucf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12392.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12392","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36269","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36786","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36473","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36384","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36794","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36809","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36803","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831764","reference_id":"1831764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831764"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/ASA-202005-7","reference_id":"ASA-202005-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-7"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.archlinux.org/AVG-1155","reference_id":"AVG-1155","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1155"},{"reference_url":"https://security.gentoo.org/glsa/202005-03","reference_id":"GLSA-202005-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-03"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17","reference_id":"mfsa2020-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18","reference_id":"mfsa2020-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2031","reference_id":"RHSA-2020:2031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2032","reference_id":"RHSA-2020:2032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2033","reference_id":"RHSA-2020:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2036","reference_id":"RHSA-2020:2036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2037","reference_id":"RHSA-2020:2037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2046","reference_id":"RHSA-2020:2046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2047","reference_id":"RHSA-2020:2047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2047"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2048","reference_id":"RHSA-2020:2048","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2049","reference_id":"RHSA-2020:2049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2050","reference_id":"RHSA-2020:2050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2050"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"},{"reference_url":"https://usn.ubuntu.com/4373-1/","reference_id":"USN-4373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12392"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hqw-tgvq-pucf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35114?format=json","vulnerability_id":"VCID-9c98-7zzd-p3f8","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12396.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12396","reference_id":"","reference_type":"","scores":[{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68861","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68778","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.6882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68818","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00576","scoring_system":"epss","scoring_elements":"0.68855","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12396"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834689","reference_id":"1834689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834689"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12396"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9c98-7zzd-p3f8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35116?format=json","vulnerability_id":"VCID-a6wm-rraf-gbh9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6831.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6831.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6831","reference_id":"","reference_type":"","scores":[{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90973","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.9096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90889","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.9091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06267","scoring_system":"epss","scoring_elements":"0.90926","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6831"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6436"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6439"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6442"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6444"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6454"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6459"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6461"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6465"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6474"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6476"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6496"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6505"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6506"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6509"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831763","reference_id":"1831763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831763"},{"reference_url":"https://security.archlinux.org/ASA-202005-2","reference_id":"ASA-202005-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-2"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/ASA-202005-7","reference_id":"ASA-202005-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-7"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.archlinux.org/AVG-1149","reference_id":"AVG-1149","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1149"},{"reference_url":"https://security.archlinux.org/AVG-1155","reference_id":"AVG-1155","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1155"},{"reference_url":"https://security.gentoo.org/glsa/202005-03","reference_id":"GLSA-202005-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-03"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17","reference_id":"mfsa2020-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18","reference_id":"mfsa2020-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2031","reference_id":"RHSA-2020:2031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2032","reference_id":"RHSA-2020:2032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2033","reference_id":"RHSA-2020:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2036","reference_id":"RHSA-2020:2036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2037","reference_id":"RHSA-2020:2037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2046","reference_id":"RHSA-2020:2046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2047","reference_id":"RHSA-2020:2047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2047"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2048","reference_id":"RHSA-2020:2048","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2049","reference_id":"RHSA-2020:2049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2050","reference_id":"RHSA-2020:2050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2064","reference_id":"RHSA-2020:2064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2064"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"},{"reference_url":"https://usn.ubuntu.com/4373-1/","reference_id":"USN-4373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-6831"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wm-rraf-gbh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35108?format=json","vulnerability_id":"VCID-gfdf-pxta-xbg1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12387.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12387","reference_id":"","reference_type":"","scores":[{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77001","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.77051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.76964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00998","scoring_system":"epss","scoring_elements":"0.7696","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831761","reference_id":"1831761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831761"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/ASA-202005-7","reference_id":"ASA-202005-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-7"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.archlinux.org/AVG-1155","reference_id":"AVG-1155","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1155"},{"reference_url":"https://security.gentoo.org/glsa/202005-03","reference_id":"GLSA-202005-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-03"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17","reference_id":"mfsa2020-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18","reference_id":"mfsa2020-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2031","reference_id":"RHSA-2020:2031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2032","reference_id":"RHSA-2020:2032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2033","reference_id":"RHSA-2020:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2036","reference_id":"RHSA-2020:2036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2037","reference_id":"RHSA-2020:2037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2046","reference_id":"RHSA-2020:2046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2047","reference_id":"RHSA-2020:2047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2047"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2048","reference_id":"RHSA-2020:2048","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2049","reference_id":"RHSA-2020:2049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2050","reference_id":"RHSA-2020:2050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2050"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"},{"reference_url":"https://usn.ubuntu.com/4373-1/","reference_id":"USN-4373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12387"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfdf-pxta-xbg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35112?format=json","vulnerability_id":"VCID-jajw-gyuh-v3dj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12395.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12395","reference_id":"","reference_type":"","scores":[{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79577","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79496","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79512","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.7954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79569","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01275","scoring_system":"epss","scoring_elements":"0.79574","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831765","reference_id":"1831765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831765"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/ASA-202005-7","reference_id":"ASA-202005-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-7"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.archlinux.org/AVG-1155","reference_id":"AVG-1155","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1155"},{"reference_url":"https://security.gentoo.org/glsa/202005-03","reference_id":"GLSA-202005-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-03"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17","reference_id":"mfsa2020-17","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-17"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18","reference_id":"mfsa2020-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2031","reference_id":"RHSA-2020:2031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2031"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2032","reference_id":"RHSA-2020:2032","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2033","reference_id":"RHSA-2020:2033","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2033"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2036","reference_id":"RHSA-2020:2036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2037","reference_id":"RHSA-2020:2037","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2037"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2046","reference_id":"RHSA-2020:2046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2047","reference_id":"RHSA-2020:2047","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2047"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2048","reference_id":"RHSA-2020:2048","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2048"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2049","reference_id":"RHSA-2020:2049","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2050","reference_id":"RHSA-2020:2050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2050"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"},{"reference_url":"https://usn.ubuntu.com/4373-1/","reference_id":"USN-4373-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4373-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12395"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jajw-gyuh-v3dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63123?format=json","vulnerability_id":"VCID-v891-36x1-nfcj","summary":"Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12390.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12390","reference_id":"","reference_type":"","scores":[{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81002","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.81014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80904","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80932","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.8097","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80973","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01472","scoring_system":"epss","scoring_elements":"0.80994","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834686","reference_id":"1834686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834686"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3557","reference_id":"RHSA-2020:3557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3557"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12390"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v891-36x1-nfcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63124?format=json","vulnerability_id":"VCID-x74h-4fwa-jqet","summary":"Documents formed using data: URLs in an object element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12391.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12391","reference_id":"","reference_type":"","scores":[{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.7201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71953","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71978","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.71967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00697","scoring_system":"epss","scoring_elements":"0.72011","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834687","reference_id":"1834687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834687"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12391"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x74h-4fwa-jqet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35110?format=json","vulnerability_id":"VCID-xqzs-zt6z-dbew","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12394.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12394","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35031","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35229","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35151","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35543","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35568","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35251","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12394"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834688","reference_id":"1834688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1834688"},{"reference_url":"https://security.archlinux.org/ASA-202005-3","reference_id":"ASA-202005-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202005-3"},{"reference_url":"https://security.archlinux.org/AVG-1148","reference_id":"AVG-1148","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1148"},{"reference_url":"https://security.gentoo.org/glsa/202005-04","reference_id":"GLSA-202005-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202005-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16","reference_id":"mfsa2020-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16"},{"reference_url":"https://usn.ubuntu.com/4353-1/","reference_id":"USN-4353-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4353-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371254?format=json","purl":"pkg:alpm/archlinux/firefox@76.0-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@76.0-1"}],"aliases":["CVE-2020-12394"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqzs-zt6z-dbew"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48890?format=json","vulnerability_id":"VCID-7wac-zu58-5kgj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6825.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6825","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72082","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.7206","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72095","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72089","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72052","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821682","reference_id":"1821682","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821682"},{"reference_url":"https://security.archlinux.org/ASA-202004-8","reference_id":"ASA-202004-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-8"},{"reference_url":"https://security.archlinux.org/AVG-1127","reference_id":"AVG-1127","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1127"},{"reference_url":"https://security.gentoo.org/glsa/202004-11","reference_id":"GLSA-202004-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12","reference_id":"mfsa2020-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-13","reference_id":"mfsa2020-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-14","reference_id":"mfsa2020-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1404","reference_id":"RHSA-2020:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1406","reference_id":"RHSA-2020:1406","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1420","reference_id":"RHSA-2020:1420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1429","reference_id":"RHSA-2020:1429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1488","reference_id":"RHSA-2020:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1489","reference_id":"RHSA-2020:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1495","reference_id":"RHSA-2020:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1496","reference_id":"RHSA-2020:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1496"},{"reference_url":"https://usn.ubuntu.com/4323-1/","reference_id":"USN-4323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4323-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hqw-tgvq-pucf"},{"vulnerability":"VCID-9c98-7zzd-p3f8"},{"vulnerability":"VCID-a6wm-rraf-gbh9"},{"vulnerability":"VCID-gfdf-pxta-xbg1"},{"vulnerability":"VCID-jajw-gyuh-v3dj"},{"vulnerability":"VCID-v891-36x1-nfcj"},{"vulnerability":"VCID-x74h-4fwa-jqet"},{"vulnerability":"VCID-xqzs-zt6z-dbew"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}],"aliases":["CVE-2020-6825"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wac-zu58-5kgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48888?format=json","vulnerability_id":"VCID-h75p-31wz-nbag","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6823.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6823","reference_id":"","reference_type":"","scores":[{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75894","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.76044","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.76013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.76023","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.76034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.7593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.7598","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.7595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75988","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00919","scoring_system":"epss","scoring_elements":"0.75975","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821693","reference_id":"1821693","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821693"},{"reference_url":"https://security.archlinux.org/ASA-202004-8","reference_id":"ASA-202004-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-8"},{"reference_url":"https://security.archlinux.org/AVG-1127","reference_id":"AVG-1127","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1127"},{"reference_url":"https://security.gentoo.org/glsa/202004-11","reference_id":"GLSA-202004-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12","reference_id":"mfsa2020-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12"},{"reference_url":"https://usn.ubuntu.com/4323-1/","reference_id":"USN-4323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hqw-tgvq-pucf"},{"vulnerability":"VCID-9c98-7zzd-p3f8"},{"vulnerability":"VCID-a6wm-rraf-gbh9"},{"vulnerability":"VCID-gfdf-pxta-xbg1"},{"vulnerability":"VCID-jajw-gyuh-v3dj"},{"vulnerability":"VCID-v891-36x1-nfcj"},{"vulnerability":"VCID-x74h-4fwa-jqet"},{"vulnerability":"VCID-xqzs-zt6z-dbew"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}],"aliases":["CVE-2020-6823"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h75p-31wz-nbag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48891?format=json","vulnerability_id":"VCID-hrz4-8mz2-a7e3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6826.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6826","reference_id":"","reference_type":"","scores":[{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65202","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65293","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.6531","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00484","scoring_system":"epss","scoring_elements":"0.65327","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6826"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821696","reference_id":"1821696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821696"},{"reference_url":"https://security.archlinux.org/ASA-202004-8","reference_id":"ASA-202004-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-8"},{"reference_url":"https://security.archlinux.org/AVG-1127","reference_id":"AVG-1127","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1127"},{"reference_url":"https://security.gentoo.org/glsa/202004-11","reference_id":"GLSA-202004-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12","reference_id":"mfsa2020-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12"},{"reference_url":"https://usn.ubuntu.com/4323-1/","reference_id":"USN-4323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hqw-tgvq-pucf"},{"vulnerability":"VCID-9c98-7zzd-p3f8"},{"vulnerability":"VCID-a6wm-rraf-gbh9"},{"vulnerability":"VCID-gfdf-pxta-xbg1"},{"vulnerability":"VCID-jajw-gyuh-v3dj"},{"vulnerability":"VCID-v891-36x1-nfcj"},{"vulnerability":"VCID-x74h-4fwa-jqet"},{"vulnerability":"VCID-xqzs-zt6z-dbew"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}],"aliases":["CVE-2020-6826"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrz4-8mz2-a7e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48885?format=json","vulnerability_id":"VCID-tre6-ytkj-k7c4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6821.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6821","reference_id":"","reference_type":"","scores":[{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67691","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67652","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67679","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67575","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67611","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67632","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00541","scoring_system":"epss","scoring_elements":"0.67685","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821674","reference_id":"1821674","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821674"},{"reference_url":"https://security.archlinux.org/ASA-202004-12","reference_id":"ASA-202004-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-12"},{"reference_url":"https://security.archlinux.org/ASA-202004-8","reference_id":"ASA-202004-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-8"},{"reference_url":"https://security.archlinux.org/AVG-1127","reference_id":"AVG-1127","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1127"},{"reference_url":"https://security.archlinux.org/AVG-1132","reference_id":"AVG-1132","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1132"},{"reference_url":"https://security.gentoo.org/glsa/202004-11","reference_id":"GLSA-202004-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12","reference_id":"mfsa2020-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-13","reference_id":"mfsa2020-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-14","reference_id":"mfsa2020-14","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1404","reference_id":"RHSA-2020:1404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1406","reference_id":"RHSA-2020:1406","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1420","reference_id":"RHSA-2020:1420","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1420"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1429","reference_id":"RHSA-2020:1429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1488","reference_id":"RHSA-2020:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1489","reference_id":"RHSA-2020:1489","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1489"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1495","reference_id":"RHSA-2020:1495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1496","reference_id":"RHSA-2020:1496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1496"},{"reference_url":"https://usn.ubuntu.com/4323-1/","reference_id":"USN-4323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4323-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hqw-tgvq-pucf"},{"vulnerability":"VCID-9c98-7zzd-p3f8"},{"vulnerability":"VCID-a6wm-rraf-gbh9"},{"vulnerability":"VCID-gfdf-pxta-xbg1"},{"vulnerability":"VCID-jajw-gyuh-v3dj"},{"vulnerability":"VCID-v891-36x1-nfcj"},{"vulnerability":"VCID-x74h-4fwa-jqet"},{"vulnerability":"VCID-xqzs-zt6z-dbew"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}],"aliases":["CVE-2020-6821"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tre6-ytkj-k7c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48889?format=json","vulnerability_id":"VCID-xhqj-w1vr-17ch","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6824.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6824.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6824","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32198","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32726","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32685","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6824"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821695","reference_id":"1821695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1821695"},{"reference_url":"https://security.archlinux.org/ASA-202004-8","reference_id":"ASA-202004-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202004-8"},{"reference_url":"https://security.archlinux.org/AVG-1127","reference_id":"AVG-1127","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1127"},{"reference_url":"https://security.gentoo.org/glsa/202004-11","reference_id":"GLSA-202004-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202004-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12","reference_id":"mfsa2020-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-12"},{"reference_url":"https://usn.ubuntu.com/4323-1/","reference_id":"USN-4323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371253?format=json","purl":"pkg:alpm/archlinux/firefox@75.0-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hqw-tgvq-pucf"},{"vulnerability":"VCID-9c98-7zzd-p3f8"},{"vulnerability":"VCID-a6wm-rraf-gbh9"},{"vulnerability":"VCID-gfdf-pxta-xbg1"},{"vulnerability":"VCID-jajw-gyuh-v3dj"},{"vulnerability":"VCID-v891-36x1-nfcj"},{"vulnerability":"VCID-x74h-4fwa-jqet"},{"vulnerability":"VCID-xqzs-zt6z-dbew"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}],"aliases":["CVE-2020-6824"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhqj-w1vr-17ch"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/firefox@75.0-1"}