Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/thunderbird@78.5.1-1
Typealpm
Namespacearchlinux
Namethunderbird
Version78.5.1-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version78.6.0-1
Latest_non_vulnerable_version91.10-1
Affected_by_vulnerabilities
0
url VCID-m92a-91pv-dffv
vulnerability_id VCID-m92a-91pv-dffv
summary If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35112
reference_id
reference_type
scores
0
value 0.00532
scoring_system epss
scoring_elements 0.67476
published_at 2026-05-14T12:55:00Z
1
value 0.00532
scoring_system epss
scoring_elements 0.67359
published_at 2026-04-29T12:55:00Z
2
value 0.00532
scoring_system epss
scoring_elements 0.67333
published_at 2026-05-05T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.67377
published_at 2026-05-07T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67416
published_at 2026-05-09T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67389
published_at 2026-05-11T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67413
published_at 2026-05-12T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67228
published_at 2026-04-01T12:55:00Z
8
value 0.00532
scoring_system epss
scoring_elements 0.67265
published_at 2026-04-02T12:55:00Z
9
value 0.00532
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-04T12:55:00Z
10
value 0.00532
scoring_system epss
scoring_elements 0.67266
published_at 2026-04-07T12:55:00Z
11
value 0.00532
scoring_system epss
scoring_elements 0.67318
published_at 2026-04-08T12:55:00Z
12
value 0.00532
scoring_system epss
scoring_elements 0.67331
published_at 2026-04-09T12:55:00Z
13
value 0.00532
scoring_system epss
scoring_elements 0.67351
published_at 2026-04-11T12:55:00Z
14
value 0.00532
scoring_system epss
scoring_elements 0.67338
published_at 2026-04-16T12:55:00Z
15
value 0.00532
scoring_system epss
scoring_elements 0.67303
published_at 2026-04-13T12:55:00Z
16
value 0.00532
scoring_system epss
scoring_elements 0.6735
published_at 2026-04-18T12:55:00Z
17
value 0.00532
scoring_system epss
scoring_elements 0.67328
published_at 2026-04-21T12:55:00Z
18
value 0.00532
scoring_system epss
scoring_elements 0.67347
published_at 2026-04-24T12:55:00Z
19
value 0.00532
scoring_system epss
scoring_elements 0.67358
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35112
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1908028
reference_id 1908028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1908028
4
reference_url https://security.archlinux.org/AVG-1364
reference_id AVG-1364
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1364
5
reference_url https://security.archlinux.org/AVG-1366
reference_id AVG-1366
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1366
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
reference_id mfsa2020-54
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-54
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
reference_id mfsa2020-55
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-55
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
reference_id mfsa2020-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-56
fixed_packages
aliases CVE-2020-35112
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m92a-91pv-dffv
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/thunderbird@78.5.1-1