{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","type":"apk","namespace":"alpine","name":"firefox","version":"84.0.1-r0","qualifiers":{"arch":"s390x","distroversion":"v3.12","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"84.0.2-r0","latest_non_vulnerable_version":"84.0.2-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60463?format=json","vulnerability_id":"VCID-38j9-cugr-abc9","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35113","reference_id":"","reference_type":"","scores":[{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67505","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67512","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67379","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67416","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67481","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67491","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908029","reference_id":"1908029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908029"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-35113"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38j9-cugr-abc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60462?format=json","vulnerability_id":"VCID-3yea-3gw6-xkcb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35111.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35111","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54848","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54842","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54837","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5483","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54889","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908027","reference_id":"1908027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908027"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-35111"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3yea-3gw6-xkcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60457?format=json","vulnerability_id":"VCID-5pf4-9k7e-hbee","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16042","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60484","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60468","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60458","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60478","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1904515","reference_id":"1904515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1904515"},{"reference_url":"https://security.archlinux.org/ASA-202012-14","reference_id":"ASA-202012-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-14"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1323","reference_id":"AVG-1323","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1323"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-05","reference_id":"GLSA-202012-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-05"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-16042"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5pf4-9k7e-hbee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60460?format=json","vulnerability_id":"VCID-5utj-ddpa-17gq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26974.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26974","reference_id":"","reference_type":"","scores":[{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.734","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73428","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73298","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.7334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73356","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908024","reference_id":"1908024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908024"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26974"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5utj-ddpa-17gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63109?format=json","vulnerability_id":"VCID-63zq-gzan-8yff","summary":"The lifecycle of IPC Actors allows managed actors to outlive their manager actors; and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26972","reference_id":"","reference_type":"","scores":[{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66814","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66668","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66734","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66706","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.6677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.6679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66747","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00518","scoring_system":"epss","scoring_elements":"0.66779","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26972"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26972"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-63zq-gzan-8yff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60461?format=json","vulnerability_id":"VCID-7krh-czjm-4ufx","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26978","reference_id":"","reference_type":"","scores":[{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62119","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62108","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62122","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.61949","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.6202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.6207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00422","scoring_system":"epss","scoring_elements":"0.62097","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908025","reference_id":"1908025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908025"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26978"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7krh-czjm-4ufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63114?format=json","vulnerability_id":"VCID-ccev-4z5c-u3hj","summary":"Mozilla developers Christian Holler, Jan-Ivar Bruaroey, and Gabriele Svelto reported memory safety bugs present in Firefox 83. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35114","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62714","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62867","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62771","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62817","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62852","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.6284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62865","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35114"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-35114"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ccev-4z5c-u3hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63110?format=json","vulnerability_id":"VCID-hs7f-4tav-dfcv","summary":"When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers.*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26975","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5948","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59403","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59427","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59443","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59459","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59441","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59473","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26975"},{"reference_url":"https://security.archlinux.org/AVG-1363","reference_id":"AVG-1363","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1363"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26975"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hs7f-4tav-dfcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60459?format=json","vulnerability_id":"VCID-jyur-q447-t7hr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26973","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55605","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55533","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55447","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55612","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55602","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908023","reference_id":"1908023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908023"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26973"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyur-q447-t7hr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63113?format=json","vulnerability_id":"VCID-m92a-91pv-dffv","summary":"If a user downloaded a file lacking an extension on Windows, and then \"Open\"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead.*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35112.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35112","reference_id":"","reference_type":"","scores":[{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67359","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67303","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.6735","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67289","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00532","scoring_system":"epss","scoring_elements":"0.67351","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-35112"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908028","reference_id":"1908028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908028"},{"reference_url":"https://security.archlinux.org/AVG-1364","reference_id":"AVG-1364","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1364"},{"reference_url":"https://security.archlinux.org/AVG-1366","reference_id":"AVG-1366","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1366"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-35112"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m92a-91pv-dffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36560?format=json","vulnerability_id":"VCID-nzcd-dk9q-puh1","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26976","reference_id":"","reference_type":"","scores":[{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83618","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83583","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83614","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83481","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83533","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83542","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83557","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01973","scoring_system":"epss","scoring_elements":"0.83551","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920649","reference_id":"1920649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1920649"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/ASA-202102-2","reference_id":"ASA-202102-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-2"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.archlinux.org/AVG-1496","reference_id":"AVG-1496","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1496"},{"reference_url":"https://security.gentoo.org/glsa/202102-02","reference_id":"GLSA-202102-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202102-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04","reference_id":"mfsa2021-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05","reference_id":"mfsa2021-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2021-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0285","reference_id":"RHSA-2021:0285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0288","reference_id":"RHSA-2021:0288","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0289","reference_id":"RHSA-2021:0289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0290","reference_id":"RHSA-2021:0290","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0297","reference_id":"RHSA-2021:0297","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0298","reference_id":"RHSA-2021:0298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0299","reference_id":"RHSA-2021:0299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0397","reference_id":"RHSA-2021:0397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0397"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4736-1/","reference_id":"USN-4736-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4736-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26976"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nzcd-dk9q-puh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63111?format=json","vulnerability_id":"VCID-t52g-d7e2-zkd4","summary":"By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26977","reference_id":"","reference_type":"","scores":[{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.5967","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59653","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59694","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26977"},{"reference_url":"https://security.archlinux.org/AVG-1363","reference_id":"AVG-1363","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1363"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26977"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t52g-d7e2-zkd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60458?format=json","vulnerability_id":"VCID-v5vy-j784-r3bj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26971","reference_id":"","reference_type":"","scores":[{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.7772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77696","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77578","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77654","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0106","scoring_system":"epss","scoring_elements":"0.77638","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908022","reference_id":"1908022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1908022"},{"reference_url":"https://security.archlinux.org/ASA-202012-23","reference_id":"ASA-202012-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-23"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1315","reference_id":"AVG-1315","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1315"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://security.gentoo.org/glsa/202012-20","reference_id":"GLSA-202012-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-20"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55","reference_id":"mfsa2020-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56","reference_id":"mfsa2020-56","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5561","reference_id":"RHSA-2020:5561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5562","reference_id":"RHSA-2020:5562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5563","reference_id":"RHSA-2020:5563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5564","reference_id":"RHSA-2020:5564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5565","reference_id":"RHSA-2020:5565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5618","reference_id":"RHSA-2020:5618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5622","reference_id":"RHSA-2020:5622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5624","reference_id":"RHSA-2020:5624","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5624"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5644","reference_id":"RHSA-2020:5644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5645","reference_id":"RHSA-2020:5645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5645"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"},{"reference_url":"https://usn.ubuntu.com/4701-1/","reference_id":"USN-4701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4701-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26971"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v5vy-j784-r3bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63112?format=json","vulnerability_id":"VCID-z1a8-kgzw-vygg","summary":"When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26979","reference_id":"","reference_type":"","scores":[{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48341","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48385","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48446","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-26979"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/ASA-202012-25","reference_id":"ASA-202012-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202012-25"},{"reference_url":"https://security.archlinux.org/AVG-1362","reference_id":"AVG-1362","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1362"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54","reference_id":"mfsa2020-54","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-54"},{"reference_url":"https://usn.ubuntu.com/4671-1/","reference_id":"USN-4671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4671-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/399032?format=json","purl":"pkg:apk/alpine/firefox@84.0.1-r0?arch=s390x&distroversion=v3.12&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}],"aliases":["CVE-2020-26979"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z1a8-kgzw-vygg"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@84.0.1-r0%3Farch=s390x&distroversion=v3.12&reponame=community"}